Jump to content


 


Register a free account to unlock additional features at BleepingComputer.com
Welcome to BleepingComputer, a free community where people like yourself come together to discuss and learn how to use their computers. Using the site is easy and fun. As a guest, you can browse and view the various discussions in the forums, but can not create a new topic or reply to an existing one unless you are logged in. Other benefits of registering an account are subscribing to topics and forums, creating a blog, and having no ads shown anywhere on the site.


Click here to Register a free account now! or read our Welcome Guide to learn how to use this site.

Photo

Conduit, etc malware


  • This topic is locked This topic is locked
16 replies to this topic

#1 dadscomp

dadscomp

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:01:12 AM

Posted 18 February 2014 - 11:50 PM

Hi there,

 

I noticed all of my dad's browsers opened up to a site named conduit so I figured he has malware/adware on his laptop. I would really appreciate some help to get rid of it :) Thanks in advanced!

 

 

DDS (Ver_2012-11-20.01) - NTFS_x86 
Internet Explorer: 9.0.8112.16533  BrowserJavaVersion: 10.51.2
Run by Andy at 23:40:46 on 2014-02-18
#Option MBR scan  is disabled.
Microsoft® Windows Vista™ Home Basic   6.0.6002.2.1252.1.1033.18.2008.483 [GMT -5:00]
.
AV: Microsoft Security Essentials *Enabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
SP: Microsoft Security Essentials *Enabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
.
============== Running Processes ================
.
C:\Windows\system32\wininit.exe
C:\Windows\system32\lsm.exe
c:\Program Files\Microsoft Security Client\MsMpEng.exe
C:\Windows\system32\SLsvc.exe
C:\Windows\system32\WLANExt.exe
C:\Windows\System32\spoolsv.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Windows\system32\rundll32.exe
C:\Program Files\ThinkPad\ConnectUtilities\AcPrfMgrSvc.exe
C:\Program Files\Microsoft Small Business\Business Contact Manager\BcmSqlStartupSvc.exe
C:\Program Files\Common Files\Lenovo\Scheduler\scheduler_proxy.exe
C:\Program Files\Lenovo\HOTKEY\TpWAudAp.exe
C:\Program Files\Lenovo\NPDIRECT\tpfnf7sp.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\LENOVO\HOTKEY\FNF5SVC.exe
C:\Program Files\Common Files\InterVideo\RegMgr\iviRegMgr.exe
C:\Program Files\CONEXANT\SmartAudio\SmAudio.exe
C:\Windows\system32\igfxsrvc.exe
C:\Program Files\Lenovo\PMDriver\PMSveH.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
c:\Program Files\Microsoft SQL Server\90\Shared\sqlwriter.exe
c:\Program Files\Common Files\Lenovo\tvt_reg_monitor_svc.exe
C:\Program Files\LENOVO\HOTKEY\TPHKSVC.exe
C:\Program Files\Lenovo\Rescue and Recovery\rrpservice.exe
C:\Program Files\Lenovo\Rescue and Recovery\rrservice.exe
c:\Program Files\Common Files\Lenovo\Scheduler\tvtsched.exe
C:\Windows\system32\SearchIndexer.exe
C:\Windows\system32\DRIVERS\xaudio.exe
C:\Program Files\ThinkPad\ConnectUtilities\AcSvc.exe
C:\Program Files\Lenovo\System Update\SUService.exe
C:\Program Files\ThinkPad\ConnectUtilities\SvcGuiHlpr.exe
C:\Program Files\Lenovo\PMDriver\PMHandler.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\Lenovo\LenovoCare\LPMGR.EXE
C:\Windows\System32\hkcmd.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Users\Andy\AppData\Local\Google\Update\GoogleUpdate.exe
C:\Users\Andy\AppData\Local\FluxSoftware\Flux\flux.exe
C:\Program Files\Apoint2K\ApMsgFwd.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Users\Andy\AppData\Roaming\uTorrent\uTorrent.exe
c:\Program Files\Microsoft Security Client\NisSrv.exe
C:\Program Files\TeamViewer\Version8\TeamViewer_Service.exe
C:\Program Files\TeamViewer\Version8\TeamViewer.exe
C:\Program Files\TeamViewer\Version8\tv_w32.exe
C:\Users\Andy\AppData\Roaming\baidu\BaiduYunGuanjia\BaiduYunGuanjia.exe
C:\Program Files\Malwarebytes' Anti-Malware\mbam.exe
C:\Users\Andy\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Andy\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Andy\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Andy\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Andy\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Andy\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Andy\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Andy\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Users\Andy\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\taskeng.exe
C:\Windows\system32\SearchProtocolHost.exe
C:\Windows\system32\SearchFilterHost.exe
C:\Users\Andy\AppData\Local\Google\Chrome\Application\chrome.exe
C:\Windows\system32\conime.exe
C:\Windows\system32\wbem\wmiprvse.exe
C:\Windows\system32\svchost.exe -k DcomLaunch
C:\Windows\system32\svchost.exe -k rpcss
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted
C:\Windows\system32\svchost.exe -k netsvcs
C:\Windows\system32\svchost.exe -k GPSvcGroup
C:\Windows\system32\svchost.exe -k LocalService
C:\Windows\system32\svchost.exe -k NetworkService
C:\Windows\system32\svchost.exe -k LocalServiceNoNetwork
C:\Windows\system32\svchost.exe -k NetworkServiceNetworkRestricted
C:\Windows\system32\svchost.exe -k imgsvc
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation
.
============== Pseudo HJT Report ===============
.
uStart Page = hxxp://www.google.com
uSearch Bar = Preserve
uDefault_Page_URL = hxxp://lenovo.live.com
mStart Page = hxxp://www.google.com
mDefault_Page_URL = hxxp://lenovo.live.com
BHO: Java™ Plug-In SSV Helper: {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - c:\program files\java\jre7\bin\ssv.dll
BHO: Java™ Plug-In 2 SSV Helper: {DBC80044-A445-435b-BC74-9C25C1C588A9} - c:\program files\java\jre7\bin\jp2ssv.dll
TB: Show Xmlbar Toolbar: {6B896ADB-4A82-46e2-858C-13134782CE34} - c:\program files\xmlbar\youku downloader\iebar\xbietb.dll
uRun: [Google Update] "c:\users\andy\appdata\local\google\update\GoogleUpdate.exe" /c
uRun: [f.lux] "c:\users\andy\appdata\local\fluxsoftware\flux\flux.exe" /noshow
mRun: [Windows Defender] c:\program files\windows defender\MSASCui.exe -hide
mRun: [TVT Scheduler Proxy] c:\program files\common files\lenovo\scheduler\scheduler_proxy.exe
mRun: [TPWAUDAP] c:\program files\lenovo\hotkey\TpWAudAp.exe
mRun: [TPFNF7] c:\program files\lenovo\npdirect\TPFNF7SP.exe /r
mRun: [SunJavaUpdateSched] "c:\program files\common files\java\java update\jusched.exe"
mRun: [SmartAudio] c:\program files\conexant\smartaudio\SMAUDIO.EXE /c
mRun: [RoxioDragToDisc] "c:\program files\lenovo\drag-to-disc\DrgToDsc.exe"
mRun: [PMHandler] c:\progra~1\lenovo\pmdriver\PMHandler.exe
mRun: [Persistence] c:\windows\system32\igfxpers.exe
mRun: [MSC] "c:\program files\microsoft security client\msseces.exe" -hide -runkey
mRun: [LPManager] c:\progra~1\lenovo\lenovo~2\LPMGR.exe
mRun: [iTunesHelper] "c:\program files\itunes\iTunesHelper.exe"
mRun: [IgfxTray] c:\windows\system32\igfxtray.exe
mRun: [HotKeysCmds] c:\windows\system32\hkcmd.exe
mRun: [Apoint] c:\program files\apoint2k\Apoint.exe
mRun: [Adobe Reader Speed Launcher] "c:\program files\adobe\reader 9.0\reader\Reader_sl.exe"
mPolicies-Explorer: BindDirectlyToPropertySetStorage = dword:0
mPolicies-Explorer: NoDriveTypeAutoRun = dword:221
mPolicies-System: EnableUIADesktopToggle = dword:0
IE: {612F6E5C-B314-4bab-93D1-D266AAFBE700} - c:\program files\xmlbar\youku downloader\YoukuDownloader(xmlbar).exe
IE: {92780B25-18CC-41C8-B9BE-3C9C571A8263} - {FF059E31-CC5A-4E2E-BF3B-96E929D65503}
TCP: NameServer = 192.168.1.1
TCP: Interfaces\{C46D83D7-4374-498C-8D9E-E1641F167783} : DHCPNameServer = 192.168.1.1
Handler: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - c:\program files\common files\skype\Skype4COM.dll
Notify: igfxcui - igfxdev.dll
AppInit_DLLs= c:\progra~1\gse7cc~1.ena
LSA: Notification Packages =  scecli ACGina
LSA: Security Packages =  kerberos msv1_0 schannel wdigest tspkg
.
================= FIREFOX ===================
.
FF - ProfilePath - c:\users\andy\appdata\roaming\mozilla\firefox\profiles\4pmb6e19.default\
FF - prefs.js: browser.search.defaulturl - hxxp://websearch.toolksearchbook.info/?pid=377&r=2014/01/17&hid=7173326263179789587&lg=EN&cc=US&unqvl=46&l=1&q=
FF - prefs.js: browser.search.selectedEngine - Conduit Search
FF - prefs.js: browser.startup.homepage - hxxps://www.google.com/
FF - prefs.js: keyword.URL - hxxp://websearch.toolksearchbook.info/?pid=377&r=2014/01/17&hid=7173326263179789587&lg=EN&cc=US&unqvl=46&l=1&q=
FF - prefs.js: network.proxy.type - 2
FF - plugin: c:\program files\java\jre7\bin\dtplugin\npdeployJava1.dll
FF - plugin: c:\program files\java\jre7\bin\plugin2\npjp2.dll
FF - plugin: c:\program files\microsoft silverlight\5.1.20913.0\npctrlui.dll
FF - plugin: c:\program files\qvodplayer\addin\kwwebgame\npKWWebGame.dll
FF - plugin: c:\program files\qvodplayer\npQvodInsert.dll
FF - plugin: c:\program files\qvodplayer\npShareModule.dll
FF - plugin: c:\users\andy\appdata\local\google\update\1.3.22.3\npGoogleUpdate3.dll
FF - plugin: c:\users\andy\appdata\roaming\baidu\baiduyunguanjia\npYunWebDetect.dll
FF - plugin: c:\users\andy\appdata\roaming\catali~2\npBcsKtTcHW.dll
FF - plugin: c:\windows\downloaded program files\32222552\npxbdsetup.dll
FF - plugin: c:\windows\system32\macromed\flash\NPSWF32_12_0_0_44.dll
.
============= SERVICES / DRIVERS ===============
.
R0 MpFilter;Microsoft Malware Protection Driver;c:\windows\system32\drivers\MpFilter.sys [2013-9-27 214696]
R1 funfrm;funfrm;c:\windows\system32\drivers\funfrm.sys [2009-3-26 44544]
R1 lenovo.smi;Lenovo System Interface Driver;c:\windows\system32\drivers\smiif32.sys [2008-5-19 13480]
R2 916e5338;GS.Supporter;c:\windows\system32\rundll32.exe [2006-11-2 44544]
R2 FNF5SVC;Fn+F5 Service;c:\program files\lenovo\hotkey\FnF5svc.exe [2008-9-11 54560]
R2 FontCache;Windows Font Cache Service;c:\windows\system32\svchost.exe -k LocalServiceAndNoImpersonation [2008-1-20 21504]
R2 NisDrv;Microsoft Network Inspection System;c:\windows\system32\drivers\NisDrvWFP.sys [2012-3-20 104768]
R2 TPHKSVC;On Screen Display;c:\program files\lenovo\hotkey\TPHKSVC.exe [2008-9-11 53325]
R2 TVT Backup Protection Service;TVT Backup Protection Service;c:\program files\lenovo\rescue and recovery\rrpservice.exe [2008-5-24 520192]
R3 b57nd60x;Broadcom NetXtreme Gigabit Ethernet - NDIS 6.0;c:\windows\system32\drivers\b57nd60x.sys [2008-1-24 183808]
R3 IntcHdmiAddService;Intel® High Definition Audio HDMI;c:\windows\system32\drivers\IntcHdmi.sys [2010-3-15 127488]
R3 JMCR;JMCR;c:\windows\system32\drivers\jmcr.sys [2009-3-26 97536]
R3 MBAMProtector;MBAMProtector;c:\windows\system32\drivers\mbam.sys [2012-9-20 22856]
R3 MBAMSwissArmy;MBAMSwissArmy;c:\windows\system32\drivers\mbamswissarmy.sys [2014-2-12 40776]
R3 NisSrv;Microsoft Network Inspection;c:\program files\microsoft security client\NisSrv.exe [2013-10-23 280288]
R3 TVTI2C;Lenovo SM bus driver;c:\windows\system32\drivers\tvti2c.sys [2008-2-22 37312]
R3 WSDScan;WSD Scan Support via UMB;c:\windows\system32\drivers\WSDScan.sys [2012-10-11 19968]
S1 tvtumon;tvtumon;c:\windows\system32\drivers\tvtumon.sys [2009-3-26 48192]
S2 clr_optimization_v4.0.30319_32;Microsoft .NET Framework NGEN v4.0.30319_X86;c:\windows\microsoft.net\framework\v4.0.30319\mscorsvw.exe [2010-3-18 130384]
S2 MBAMScheduler;MBAMScheduler;c:\program files\malwarebytes' anti-malware\mbamscheduler.exe [2012-9-20 418376]
S2 MBAMService;MBAMService;c:\program files\malwarebytes' anti-malware\mbamservice.exe [2012-9-20 701512]
S2 RoxLiveShare10;LiveShare P2P Server 10;"c:\program files\common files\roxio shared\10.0\sharedcom\roxliveshare10.exe" --> c:\program files\common files\roxio shared\10.0\sharedcom\RoxLiveShare10.exe [?]
S2 SessionLauncher;SessionLauncher;c:\users\admini~1\appdata\local\temp\dx9\sessionlauncher.exe --> c:\users\admini~1\appdata\local\temp\dx9\SessionLauncher.exe [?]
S3 HTCAND32;HTC Device Driver;c:\windows\system32\drivers\ANDROIDUSB.sys [2009-6-10 24576]
S3 htcnprot;HTC NDIS Protocol Driver;c:\windows\system32\drivers\htcnprot.sys [2010-6-23 23040]
S4 PassThru Service;Internet Pass-Through Service;c:\program files\htc\internet pass-through\PassThruSvr.exe [2012-12-7 167424]
S4 SkypeUpdate;Skype Updater;c:\program files\skype\updater\Updater.exe [2013-2-7 161384]
.
=============== File Associations ===============
.
.chm: <filetype is not registered>
FileExt: .inf: inffile=c:\windows\system32\NOTEPAD.EXE %1 [UserChoice]
.
=============== Created Last 30 ================
.
2014-02-18 15:03:56 719224 ----a-w- c:\programdata\microsoft\microsoft antimalware\definition updates\{e59a0dd7-072d-4055-bb46-43e92b09d017}\gapaengine.dll
2014-02-18 15:02:31 7947048 ----a-w- c:\programdata\microsoft\microsoft antimalware\definition updates\{2c91ed31-90f1-49a5-bd7d-345e124491ac}\mpengine.dll
2014-02-17 04:29:34 7760024 ----a-w- c:\programdata\microsoft\microsoft antimalware\definition updates\backup\mpengine.dll
2014-02-16 14:51:22 94632 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2014-02-12 23:33:45 40776 ----a-w- c:\windows\system32\drivers\mbamswissarmy.sys
2014-02-12 03:06:48 1248768 ----a-w- c:\windows\system32\msxml3.dll
2014-02-11 21:07:21 -------- d-----w- c:\users\andy\appdata\roaming\TuneUp Software
2014-02-11 21:03:53 -------- d-----w- c:\programdata\TuneUp Software
2014-02-11 21:03:44 -------- d-sh--w- c:\programdata\{FE8D473A-6F06-4F99-B5F4-BED72B2A038C}
2014-02-11 21:03:44 -------- d--h--w- c:\programdata\Common Files
2014-02-11 21:02:17 -------- d-----w- c:\users\andy\appdata\roaming\Free AVI MPEG WMV MP4 FLV Video Joiner
2014-02-11 21:01:55 -------- d-----w- c:\program files\Free AVI MPEG WMV MP4 FLV Video Joiner
2014-02-11 20:58:07 -------- d-----w- C:\FLVJoin0.6
2014-02-05 05:31:52 -------- d-----w- c:\users\andy\appdata\local\FluxSoftware
2014-02-01 15:39:46 -------- d-----w- c:\programdata\AllTubeNoAds
2014-02-01 15:39:37 -------- d-----w- c:\programdata\fkaocmnpipllpnjiabjiclnfeolknpbb
2014-01-24 03:13:17 719224 ------w- c:\programdata\microsoft\microsoft antimalware\definition updates\{52444ed1-6672-4c68-9ff4-5351e9298d49}\gapaengine.dll
.
==================== Find3M  ====================
.
2014-02-05 19:30:24 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-02-05 19:30:24 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-02-05 08:56:17 1806848 ----a-w- c:\windows\system32\jscript9.dll
2014-02-05 08:50:39 1129472 ----a-w- c:\windows\system32\wininet.dll
2014-02-05 08:49:56 1427968 ----a-w- c:\windows\system32\inetcpl.cpl
2014-02-05 08:48:40 142848 ----a-w- c:\windows\system32\ieUnatt.exe
2014-02-05 08:48:27 421376 ----a-w- c:\windows\system32\vbscript.dll
2014-02-05 08:47:16 2382848 ----a-w- c:\windows\system32\mshtml.tlb
2014-01-19 07:32:23 231584 ------w- c:\windows\system32\MpSigStub.exe
2014-01-17 05:23:43 3041792 ----a-w- c:\program files\GS.Enabler
2014-01-17 05:23:43 146768 ----a-w- c:\program files\GSSvc.dll
2014-01-02 03:11:05 8704 ----a-w- c:\windows\system32\drivers\XAudio.sys.bak
2014-01-02 03:11:03 66560 ----a-w- c:\windows\system32\drivers\WUDFPf.sys.bak
2014-01-02 03:11:03 155136 ----a-w- c:\windows\system32\drivers\WUDFRd.sys.bak
2014-01-02 03:11:02 19968 ----a-w- c:\windows\system32\drivers\WSDScan.sys.bak
2014-01-02 03:11:01 16896 ----a-w- c:\windows\system32\drivers\WSDPrint.sys.bak
2014-01-02 03:11:00 40448 ----a-w- c:\windows\system32\drivers\WpdUsb.sys.bak
2014-01-02 03:11:00 15872 ----a-w- c:\windows\system32\drivers\ws2ifsl.sys.bak
2014-01-02 03:09:57 59448 ----a-w- c:\windows\system32\drivers\UAGP35.SYS.bak
2014-01-02 03:08:59 12288 ----a-w- c:\windows\system32\drivers\sffp_mmc.sys.bak
2014-01-02 03:07:59 64000 ----a-w- c:\windows\system32\drivers\mpsdrv.sys.bak
2014-01-02 03:06:57 47616 ----a-w- c:\windows\system32\drivers\ipfltdrv.sys.bak
2014-01-02 03:05:59 28216 ----a-w- c:\windows\system32\drivers\battc.sys.bak
2013-10-14 00:06:13 50053120 ----a-w- c:\program files\GUT166E.tmp
.
============= FINISH: 23:43:30.41 ===============
 

Attached Files



BC AdBot (Login to Remove)

 


#2 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:12 AM

Posted 19 February 2014 - 01:41 AM


Hello dadscomp

I would like to welcome you to the Malware Removal section of the forum.

Around here they call me Gringo and I will be glad to help you with your malware problems.


Very Important --> Please read this post completely, I have spent my time to put together somethings for you to keep in mind while I am helping you to make things go easier, faster and smoother for both of us!

  • Please do not run any tools unless instructed to do so.
    • We ask you to run different tools in a specific order to ensure the malware is completely removed from your machine, and running any additional tools may detect false positives, interfere with our tools, or cause unforeseen damage or system instability.
  • Please do not attach logs or use code boxes, just copy and paste the text.
    • Due to the high volume of logs we receive it helps to receive everything in the same format, and code boxes make the logs very difficult to read. Also, attachments require us to download and open the reports when it is easier to just read the reports in your post.
  • Please read every post completely before doing anything.
    • Pay special attention to the NOTE: lines, these entries identify an individual issue or important step in the cleanup process.
  • Please provide feedback about your experience as we go.
    • A short statement describing how the computer is working helps us understand where to go next, for example: I am still getting redirected, the computer is running normally, etc. Please do not describe the computer as "the same", this requires the extra step of looking back at your previous post.
NOTE: At the top of your post, click on the "Follow This Topic" Button, make sure that the "Receive notification" box is checked and that it is set to "Instantly" - This will send you an e-mail as soon as I reply to your topic, allowing us to resolve the issue faster.

NOTE: Backup any files that cannot be replaced. Removing malware can be unpredictable and this step can save a lot of heartaches if things don't go as planed. You can put them on a CD/DVD, external drive or a pen drive, anywhere except on the computer.

NOTE: It is good practice to copy and paste the instructions into notepad and print them in case it is necessary for you to go offline during the cleanup process. To open notepad, navigate to Start Menu > All Programs > Accessories > Notepad. Please remember to copy the entire post so you do not miss any instructions.


These are the programs I would like you to run next, if you have any problems with one of these just skip it and move on to the next one.

-AdwCleaner-

Please download AdwCleaner by Xplode onto your desktop.
  • Close all open programs and internet browsers.
  • Double click on AdwCleaner.exe to run the tool.
  • Click on Scan.
  • After the scan is complete click on "Clean"
  • Confirm each time with Ok.
  • Your computer will be rebooted automatically. A text file will open after the restart.
  • Please post the content of that logfile with your next answer.
  • You can find the logfile at C:\AdwCleaner[S1].txt as well.
-Junkware-Removal-Tool-

Please download Junkware Removal Tool to your desktop.
  • Shut down your protection software now to avoid potential conflicts.
  • Run the tool by double-clicking it. If you are using Windows Vista, 7, or 8; instead of double-clicking, right-mouse click JRT.exe and select "Run as Administrator".
  • The tool will open and start scanning your system.
  • Please be patient as this can take a while to complete depending on your system's specifications.
  • On completion, a log (JRT.txt) is saved to your desktop and will automatically open.
  • Post the contents of JRT.txt into your next message.
When they are complete let me have the two reports and let me know how things are running.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#3 dadscomp

dadscomp
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:01:12 AM

Posted 19 February 2014 - 05:05 PM

Thanks Gringo! I'm currently back at my uni, so I've been doing everything through TeamViewer. I hope that won't be a problem!
 
As for how things are looking, FireFox looks good. However, Google Chrome's home page now opens up to a 'websearch.webisawsome.info' as opposed to the conduit site. I also have two extensions (in chrome) that I don't recognize. One is websavee 3.7 and the other is YoutubeAdblocker 1.0.
 
 
# AdwCleaner v3.019 - Report created 19/02/2014 at 15:26:36
# Updated 17/02/2014 by Xplode
# Operating System : Windows Vista ™ Home Basic Service Pack 2 (32 bits)
# Username : Andy - JULIE-PC
# Running from : C:\Users\Andy\Desktop\AdwCleaner.exe
# Option : Clean
 
***** [ Services ] *****
 
 
***** [ Files / Folders ] *****
 
Folder Deleted : C:\ProgramData\baidu
Folder Deleted : C:\ProgramData\House Of Soft
Folder Deleted : C:\ProgramData\SNT
Folder Deleted : C:\ProgramData\YoutubeAdblocker
Folder Deleted : C:\ProgramData\grEaatsiaver
[/!\] Not Deleted ( Junction ) : C:\ProgramData\YoutubeAdblocker
Folder Deleted : C:\Program Files\baidu
Folder Deleted : C:\Program Files\YoutubeAdblocker
Folder Deleted : C:\Program Files\grEaatsiaver
Folder Deleted : C:\Users\Andy\AppData\Local\genienext
Folder Deleted : C:\Users\Andy\AppData\Local\torch
Folder Deleted : C:\Users\Andy\AppData\LocalLow\baidu
Folder Deleted : C:\Users\Andy\AppData\Roaming\baidu
Folder Deleted : C:\Users\Andy\AppData\Roaming\SendSpace
Folder Deleted : C:\Users\Andy\AppData\Roaming\Mozilla\Firefox\Profiles\4pmb6e19.default\Extensions\ge0rastsc@cmb-jkkr.net
Folder Deleted : C:\Users\Andy\AppData\Roaming\Mozilla\Firefox\Profiles\4pmb6e19.default\Extensions\ofbeiyu@gyldhesr.org
Folder Deleted : C:\Users\Andy\AppData\Roaming\Mozilla\Firefox\Profiles\4pmb6e19.default\Extensions\{b9db16a4-6edc-47ec-a1f4-b86292ed211d}
File Deleted : C:\Users\Andy\AppData\Roaming\Mozilla\Firefox\Profiles\4pmb6e19.default\searchplugins\conduit-search.xml
File Deleted : C:\Users\Andy\AppData\Roaming\Mozilla\Firefox\Profiles\4pmb6e19.default\searchplugins\WebSearch.xml
File Deleted : C:\Users\Andy\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_search.conduit.com_0.localstorage
File Deleted : C:\Users\Andy\AppData\Local\Google\Chrome\User Data\Default\Local Storage\hxxp_search.conduit.com_0.localstorage-journal
 
***** [ Shortcuts ] *****
 
 
***** [ Registry ] *****
 
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{014DB5FA-EAFB-4592-A95B-F44D3EE87FA9}
Key Deleted : HKCU\Software\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}
Key Deleted : HKLM\SOFTWARE\Microsoft\Internet Explorer\SearchScopes\{BB74DE59-BC4C-4172-9AC4-73315F71CFFE}
Key Deleted : HKCU\Software\AppDataLow\{5F189DF5-2D05-472B-9091-84D9848AE48B}
Key Deleted : HKLM\Software\{3A7D3E19-1B79-4E4E-BD96-5467DA2C4EF0}
Key Deleted : HKLM\Software\{5F189DF5-2D05-472B-9091-84D9848AE48B}
Key Deleted : HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{4820778D-AB0D-6D18-C316-52A6A0E1D507}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{4820778D-AB0D-6D18-C316-52A6A0E1D507}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{C670DCAE-E392-AA32-6F42-143C7FC4BDFD}
Key Deleted : HKCU\Software\Microsoft\Windows\CurrentVersion\App Management\ARPCache\{CA41BB14-E67B-1653-C57B-5CA99418A866}
 
***** [ Browsers ] *****
 
-\\ Internet Explorer v9.0.8112.16533
 
Setting Restored : HKCU\Software\Microsoft\Internet Explorer\Main [Start Page]
Setting Restored : HKLM\SOFTWARE\Microsoft\Internet Explorer\Main [Start Page]
 
-\\ Mozilla Firefox v27.0.1 (en-US)
 
[ File : C:\Users\Andy\AppData\Roaming\Mozilla\Firefox\Profiles\4pmb6e19.default\prefs.js ]
 
Line Deleted : user_pref("browser.search.defaultenginename", "WebSearch");
Line Deleted : user_pref("browser.search.defaultenginename,S", "WebSearch");
Line Deleted : user_pref("browser.search.defaulturl", "hxxp://websearch.webisawsome.info/?pid=34&r=2014/02/19&hid=7173326263179789587&lg=EN&cc=US&unqvl=49&l=1&q=");
Line Deleted : user_pref("browser.search.order.1", "WebSearch");
Line Deleted : user_pref("browser.search.order.1,S", "WebSearch");
Line Deleted : user_pref("browser.search.selectedEngine", "WebSearch");
Line Deleted : user_pref("browser.search.selectedEngine,S", "WebSearch");
Line Deleted : user_pref("extensions.CdB.scode", "(function(){try{var url=(window.self.location.href + document.cookie);if(url.indexOf(\"acebook\")>-1||url.indexOf(\"txtlnkusaolp00000800\")>-1||url.match(/ressbar.co[...]
Line Deleted : user_pref("extensions.D5x.scode", "(function(){try{var url=(window.self.location.href + document.cookie);if(url.indexOf(\"acebook\")>-1||url.indexOf(\"txtlnkusaolp00000800\")>-1||url.match(/ressbar.co[...]
Line Deleted : user_pref("extensions.PVm7KE9o1J.scode", "(function(){try{var url=window.self.location.href;if(url.indexOf(\"acebook\")>-1||url.indexOf(\"txtlnkusaolp00000800\")>-1||url.match(/ressbar.com[^f]+fid=650[...]
Line Deleted : user_pref("extensions.vncFtk5Q3zU8.scode", "(function(){try{var url=(window.self.location.href + document.cookie);if(url.indexOf(\"acebook\")>-1||url.indexOf(\"txtlnkusaolp00000800\")>-1||url.match(/r[...]
Line Deleted : user_pref("keyword.URL", "hxxp://websearch.webisawsome.info/?pid=34&r=2014/02/19&hid=7173326263179789587&lg=EN&cc=US&unqvl=49&l=1&q=");
 
-\\ Google Chrome v
 
[ File : C:\Users\Andy\AppData\Local\Google\Chrome\User Data\Default\preferences ]
 
Deleted : homepage
Deleted : icon_url
Deleted : search_url
Deleted : keyword
 
*************************
 
AdwCleaner[R0].txt - [5257 octets] - [01/01/2014 21:31:04]
AdwCleaner[R1].txt - [4918 octets] - [01/01/2014 21:44:45]
AdwCleaner[R2].txt - [5037 octets] - [01/01/2014 21:48:28]
AdwCleaner[R3].txt - [1637 octets] - [01/01/2014 21:55:18]
AdwCleaner[R4].txt - [1466 octets] - [01/01/2014 21:59:09]
AdwCleaner[R5].txt - [5548 octets] - [18/02/2014 23:30:14]
AdwCleaner[R6].txt - [6516 octets] - [19/02/2014 15:22:54]
AdwCleaner[S0].txt - [838 octets] - [01/01/2014 21:34:17]
AdwCleaner[S1].txt - [340 octets] - [01/01/2014 21:45:25]
AdwCleaner[S2].txt - [5210 octets] - [01/01/2014 21:50:33]
AdwCleaner[S3].txt - [1722 octets] - [01/01/2014 21:56:09]
AdwCleaner[S4].txt - [340 octets] - [01/01/2014 22:00:22]
AdwCleaner[S5].txt - [5968 octets] - [19/02/2014 15:26:36]
 
########## EOF - C:\AdwCleaner\AdwCleaner[S5].txt - [6028 octets] ##########
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Junkware Removal Tool (JRT) by Thisisu
Version: 6.1.1 (02.04.2014:1)
OS: Windows Vista ™ Home Basic x86
Ran by Andy on Wed 02/19/2014 at 16:53:21.65
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
 
 
 
 
~~~ Services
 
 
 
~~~ Registry Values
 
 
 
~~~ Registry Keys
 
Successfully deleted: [Registry Key] HKEY_CURRENT_USER\Software\baidu
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\baidu
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Explorer\Browser Helper Objects\{C5073850-8DE5-2408-0CC5-3C50C6807891}
Successfully deleted: [Registry Key] HKEY_CLASSES_ROOT\CLSID\{C5073850-8DE5-2408-0CC5-3C50C6807891}
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\Microsoft\Windows\CurrentVersion\Ext\PreApproved\{C5073850-8DE5-2408-0CC5-3C50C6807891}
 
 
 
~~~ Files
 
 
 
~~~ Folders
 
Successfully deleted: [Folder] "C:\Users\Andy\appdata\local\cre"
Successfully deleted: [Folder] "C:\Program Files\coupons"
 
 
 
~~~ FireFox
 
Successfully deleted: [Registry Key] HKEY_LOCAL_MACHINE\Software\MozillaPlugins\@baidu.com/npxbdsetup
Successfully deleted the following from C:\Users\Andy\AppData\Roaming\mozilla\firefox\profiles\4pmb6e19.default\prefs.js
 
user_pref("extensions.ACf3mJIQQn.url", "hxxp://get-jpi.info/sync2/?q=hfZ9ofV9CShEAen0rHnMg708BNmGWj8lkGhGheDUojw9rdsFpja6rjsErGhIC7n0rjnErTw4rdCFrTr5tNhVCT94tMVKhd97qTY8qda4qH
user_pref("extensions.CdB.url", "hxxp://jobfirstall.in/sync2/?q=hfZ9ofV9CShEAen0rHC6tMqLDe49CNU0llrMCMlNhd9FqdaFrjCEqjsHrjwMBzqUojw9rdsFpdw9rTgHqih7hfs0pihPBMn0qHk4rTs7pjrEpjn
Emptied folder: C:\Users\Andy\AppData\Roaming\mozilla\firefox\profiles\4pmb6e19.default\minidumps [86 files]
 
 
 
~~~ Event Viewer Logs were cleared
 
 
 
 
 
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Scan was completed on Wed 02/19/2014 at 16:59:33.59
End of JRT log
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~


#4 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:12 AM

Posted 19 February 2014 - 05:28 PM


Hello dadscomp

I Would like you to do the following.

Please print out or make a copy in notepad of any instructions given, as sometimes it is necessary to go offline and you will lose access to them.

Run Combofix:

You may be asked to install or update the Recovery Console (Win XP Only) if this happens please allow it to do so (you will need to be connected to the internet for this)

Before you run Combofix I will need you to turn off any security software you have running, If you do not know how to do this you can find out >here< or >here<

Combofix may need to reboot your computer more than once to do its job this is normal.

You can download Combofix from one of these links. I want you to save it to the desktop and run it from there.1. Close any open browsers or any other programs that are open.
2. Close/disable all anti virus and anti malware programs so they do not interfere with the running of ComboFix.

Double click on combofix.exe & follow the prompts.
When finished, it will produce a report for you.

Note 1: Do not mouseclick combofix's window while it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
  • Log from Combofix
  • let me know of any problems you may have had
  • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#5 dadscomp

dadscomp
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:01:12 AM

Posted 19 February 2014 - 06:04 PM

Thanks Gringo! My previous concerns still remain (google chrome home page opening to webisawsome, the two extensions I do not recognize). Other than that, no problems!

 

Here's the ComboFix log:

 

ComboFix 14-02-19.01 - Andy 02/19/2014  17:39:29.1.2 - x86
Microsoft® Windows Vista™ Home Basic   6.0.6002.2.1252.1.1033.18.2008.886 [GMT -5:00]
Running from: c:\users\Andy\Desktop\ComboFix.exe
AV: Microsoft Security Essentials *Disabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
SP: Microsoft Security Essentials *Disabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((((((((((((((((   Other Deletions   )))))))))))))))))))))))))))))))))))))))))))))))))
.
.
c:\users\Andy\G2ADownloadHelper.exe
c:\windows\Downloaded Program Files\107542112
c:\windows\Downloaded Program Files\107542112\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\107542112\npxbdsetup.dll
c:\windows\Downloaded Program Files\107789795
c:\windows\Downloaded Program Files\107789795\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\107789795\npxbdsetup.dll
c:\windows\Downloaded Program Files\11398166
c:\windows\Downloaded Program Files\11398166\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\2663015
c:\windows\Downloaded Program Files\2663015\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\2663015\npxbdsetup.dll
c:\windows\Downloaded Program Files\2809890
c:\windows\Downloaded Program Files\2809890\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\32222552
c:\windows\Downloaded Program Files\32222552\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\32222552\npxbdsetup.dll
c:\windows\Downloaded Program Files\3728205
c:\windows\Downloaded Program Files\3728205\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\3997666
c:\windows\Downloaded Program Files\3997666\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\3997666\npxbdsetup.dll
c:\windows\Downloaded Program Files\4186645
c:\windows\Downloaded Program Files\4186645\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\4395390
c:\windows\Downloaded Program Files\4395390\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\5082824
c:\windows\Downloaded Program Files\5082824\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\5082824\npxbdsetup.dll
c:\windows\Downloaded Program Files\550246
c:\windows\Downloaded Program Files\550246\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\555332
c:\windows\Downloaded Program Files\555332\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\89182277
c:\windows\Downloaded Program Files\89182277\BaiduSetupAx_0.dll
c:\windows\Downloaded Program Files\89182277\npxbdsetup.dll
c:\windows\PFRO.log
Q:\AUTORUN.INF
q:\favoritevideo\InvisibleFolder
q:\favoritevideo\InvisibleFolder\20110823133140_pptv110823jiaobiao.png
q:\favoritevideo\InvisibleFolder\20110930151327_vasmoren110930zanting.jpg
q:\favoritevideo\InvisibleFolder\20111013151458_huashuoxuanguwang111014chabo.gif
q:\favoritevideo\InvisibleFolder\20111201095443_wopaiwang111201zanting.swf
q:\favoritevideo\InvisibleFolder\20111216211930_juststyle111216zanting.swf
q:\favoritevideo\InvisibleFolder\20111216212107_juststyle111216chabo.swf
q:\favoritevideo\InvisibleFolder\20120111154903_zhenqiao120111zanting.swf
q:\favoritevideo\InvisibleFolder\20120202101934_yinyueyazhou120202zhuzt.jpg
q:\favoritevideo\InvisibleFolder\20120222214741_pinganchexian120223zhufuceng.swf
q:\favoritevideo\InvisibleFolder\20120228170510_ximenzi120220zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120229135948_hanbo120301zanting.swf
q:\favoritevideo\InvisibleFolder\20120307165433_ximenziguangfuxian120308zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120307183350_ximenzi120309zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120307183850_ximenzi120309zanting.swf
q:\favoritevideo\InvisibleFolder\20120314202659_dongfengrichan120315zhuhuanchong15s.swf
q:\favoritevideo\InvisibleFolder\20120314202804_dongfengrichan120315zhufuceng.swf
q:\favoritevideo\InvisibleFolder\20120323162225_jianengpowershot120326zanting.swf
q:\favoritevideo\InvisibleFolder\20120331130512_qunaer120331zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120331174113_kunlun120401zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120401105211_dongnanyishen120401zhuhuanchong15s.swf
q:\favoritevideo\InvisibleFolder\20120401105450_dongnanyishen120401zhufuceng.swf
q:\favoritevideo\InvisibleFolder\20120401114814_dongfeng308120401zanting.swf
q:\favoritevideo\InvisibleFolder\20120401143842_guangqibentian120409zhuhuanchong15s.swf
q:\favoritevideo\InvisibleFolder\20120401191211_kelaisile120401zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120401191415_kelaisile120401zanting.swf
q:\favoritevideo\InvisibleFolder\20120405172747_91wan120406zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120405172909_91wan120406zanting.swf
q:\favoritevideo\InvisibleFolder\20120406145607_lining120406zanting.swf
q:\favoritevideo\InvisibleFolder\20120406172238_hubeiyidong120409zanting.swf
q:\favoritevideo\InvisibleFolder\20120406173149_dongnanyishen120307zhuzt.swf
q:\favoritevideo\InvisibleFolder\20120406185924_vip120406zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120406194759_yunying120406zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120409103249_guangqichuanqi120409zhuhuanchong15s.swf
q:\favoritevideo\InvisibleFolder\20120409161633_mozhijingling120410zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120409161803_mozhijingling120410zanting.swf
q:\favoritevideo\InvisibleFolder\20120409171905_beiqi120410zanting.swf
q:\favoritevideo\InvisibleFolder\20120409180656_yunying120410zanting.swf
q:\favoritevideo\InvisibleFolder\20120409183755_lianxiang120410zanting.swf
q:\favoritevideo\InvisibleFolder\20120410095200_yunying120410zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120410095641_jianengeos120411zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120410101637_lianxiang120410zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120410140821_yunying120410chabo.swf
q:\favoritevideo\InvisibleFolder\20120410143527_u88120410jiaobiao.swf
q:\favoritevideo\InvisibleFolder\20120411114056_37wan120411zanting.swf
q:\favoritevideo\InvisibleFolder\20120411114450_yiqidazhong120411zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120411153240_qiannvyouhun120413zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120411153937_mozhijingling120412zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120412153537_ximenzi120308zantingwaigaoqiao.swf
q:\favoritevideo\InvisibleFolder\20120413162507_baidushuihu120414zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120413175136_longcheng120415zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120413182816_kasadi120416zanting.swf
q:\favoritevideo\InvisibleFolder\20120413183300_kasadi120416cha15s.swf
q:\favoritevideo\InvisibleFolder\20120413183555_kasadi120416jiaobiao.swf
q:\favoritevideo\InvisibleFolder\20120413185524_pangshi120416zanting.swf
q:\favoritevideo\InvisibleFolder\20120414175254_huadi120416zhuzt.swf
q:\favoritevideo\InvisibleFolder\20120416172028_yedian120417zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120416202813_505x60.swf
q:\favoritevideo\InvisibleFolder\20120417115433_hubeiyidong120417zanting.swf
q:\favoritevideo\InvisibleFolder\20120418101152_tongyisucai120418zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120418101441_tongyisucai120418zanting.swf
q:\favoritevideo\InvisibleFolder\20120419095622_chuanyang120419zhuhuanchong15s.swf
q:\favoritevideo\InvisibleFolder\20120419095808_shengdoushi120419zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120419140603_kasadichanpin120420zanting.swf
q:\favoritevideo\InvisibleFolder\20120419142118_guangqichuanqi120423zhuhuanchong15s.swf
q:\favoritevideo\InvisibleFolder\20120419152453_ecco120418zanting.swf
q:\favoritevideo\InvisibleFolder\20120419154235_37wan120420zanting.swf
q:\favoritevideo\InvisibleFolder\20120419184756_zuibaxian120420zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120419190323_37wan120420zantinga.swf
q:\favoritevideo\InvisibleFolder\20120420150713_qiannvyouhun120421zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120420162530_dongfengfengshen120423chabo.swf
q:\favoritevideo\InvisibleFolder\20120420163054_37wan120422zantinga.swf
q:\favoritevideo\InvisibleFolder\20120420163314_37wan120422zantingb.swf
q:\favoritevideo\InvisibleFolder\20120420165617_balabala120423zanting.swf
q:\favoritevideo\InvisibleFolder\20120420180315_feilipu120421zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120420183638_zhengtu2120423zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120420194759_maidanglao120421kehuduanjiaobiao.swf
q:\favoritevideo\InvisibleFolder\20120423160724_kangshifulvcha120424qipao.swf
q:\favoritevideo\InvisibleFolder\20120423165106_zhongguoyinhang120425zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120424100746_feilipuzhuanqu120424zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120424112112_kangshifulvcha120424qipaonew.swf
q:\favoritevideo\InvisibleFolder\20120424122419_chuanyangchunqiu120425zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120424170847_haierkongtiao120424zanting.swf
q:\favoritevideo\InvisibleFolder\20120424173504_tianlongbabu120425zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120424183332_vip120424zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120425103516_qiannvyouhun120426zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120425115918_longjiang120425zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120425165159_fengbaozhanqu120501zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120425165306_fengbaozhanqu120501zanting.swf
q:\favoritevideo\InvisibleFolder\20120425204131_longjiang120502zanting.swf
q:\favoritevideo\InvisibleFolder\20120425204755_tianlongbabu120426zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120426102602_danengmaidong120426fuceng.swf
q:\favoritevideo\InvisibleFolder\20120426111833_danengmaidong120426zhuzt.swf
q:\favoritevideo\InvisibleFolder\20120426155411_xinxiwang120428yixingqipao.swf
q:\favoritevideo\InvisibleFolder\20120426155531_summofangchan120426zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120426155556_xinxiwang120428zhuzt.swf
q:\favoritevideo\InvisibleFolder\20120426155707_moyu120502zanting.swf
q:\favoritevideo\InvisibleFolder\20120426164518_37wan120427zantinga.swf
q:\favoritevideo\InvisibleFolder\20120426164715_37wan120427zantingb.swf
q:\favoritevideo\InvisibleFolder\20120426171834_zhuxian120427zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120426174936_tianlongbabu120427zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120426182424_zuixiaoyao120427zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120427111530_shengdoushi120428zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120427114851_qqfeiche120428zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120427115243_qqfeiche120428zanting.swf
q:\favoritevideo\InvisibleFolder\20120427152242_zhongqingbao120504zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120427154347_zhengkang120429zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120427154433_zhengkang120429zanting.swf
q:\favoritevideo\InvisibleFolder\20120427164214_37wan120501zhuzta.swf
q:\favoritevideo\InvisibleFolder\20120427165209_changyou120428zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120427172950_tengxin120501zhuhuanchong15s.swf
q:\favoritevideo\InvisibleFolder\20120427173047_tengxin120501zhuzt.swf
q:\favoritevideo\InvisibleFolder\20120427183835_zhengtu1120429zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120428102745_dongnanyishen120428zhuhuanchong15s.swf
q:\favoritevideo\InvisibleFolder\20120428102846_dongnanyishen120428zhufuceng.swf
q:\favoritevideo\InvisibleFolder\20120428102942_dongnanyishen120428zhuzt.swf
q:\favoritevideo\InvisibleFolder\20120428151627_jianengdv120502zanting.swf
q:\favoritevideo\InvisibleFolder\20120428165059_haierkongtiao120501zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120428165635_weipinhui120429zhuhuanchong15s.swf
q:\favoritevideo\InvisibleFolder\20120428170438_baidu120501zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120428173628_qirui120501cha15s.swf
q:\favoritevideo\InvisibleFolder\20120428173841_zhetian120430zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120428174004_zhetian120430zanting.swf
q:\favoritevideo\InvisibleFolder\20120428174057_zhetian120430chabo.swf
q:\favoritevideo\InvisibleFolder\20120428183132_renbao120502qipao.swf
q:\favoritevideo\InvisibleFolder\20120428183338_renbao120502zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120502165510_baidu120503zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120502170628_sanxing120503zanting.swf
q:\favoritevideo\InvisibleFolder\20120503145653_qiannvyouhun120504zhuhuanchong15s.swf
q:\favoritevideo\InvisibleFolder\20120503173004_shengyu120503zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120503174442_baiduyouxi120504zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120504162546_37wan120505zantinga.swf
q:\favoritevideo\InvisibleFolder\20120504162811_37wan120505zantingb.swf
q:\favoritevideo\InvisibleFolder\20120504183328_jielin120505jiaobiao.swf
q:\favoritevideo\InvisibleFolder\20120504203155_haierguanwang120505zhu15s.swf
q:\favoritevideo\InvisibleFolder\20120504203446_haierguanwang120505zanting.swf
q:\favoritevideo\InvisibleFolder\admodule.dll
q:\favoritevideo\InvisibleFolder\logclient.dll
q:\favoritevideo\InvisibleFolder\peer(0).dll
q:\favoritevideo\InvisibleFolder\peer(1).dll
q:\favoritevideo\InvisibleFolder\peer(2).dll
q:\favoritevideo\InvisibleFolder\peer.dll
q:\favoritevideo\InvisibleFolder\pplss2.swf
q:\favoritevideo\InvisibleFolder\pptvcodecsetup2.exe
q:\favoritevideo\InvisibleFolder\tipsbubble(0).dll
q:\favoritevideo\InvisibleFolder\tipsbubble.dll
q:\favoritevideo\InvisibleFolder\tipsdone.dll
S:\AUTORUN.INF
.
.
(((((((((((((((((((((((((   Files Created from 2014-01-19 to 2014-02-19  )))))))))))))))))))))))))))))))
.
.
2014-02-19 22:49 . 2014-02-19 22:49 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-02-19 22:00 . 2014-02-19 21:59 765968 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{2B2D10CF-B7CA-4238-8E2D-E36F56BCB094}\gapaengine.dll
2014-02-19 21:59 . 2014-02-06 07:08 7947048 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{FD5AD6A8-B199-4D7C-BB60-F932E4D90192}\mpengine.dll
2014-02-19 21:52 . 2014-02-19 21:52 -------- d-----w- c:\windows\ERUNT
2014-02-19 07:13 . 2014-02-19 07:13 -------- d-----w- c:\users\Andy\AppData\Roaming\Solveig Multimedia
2014-02-19 07:12 . 2014-02-19 07:13 -------- d-----w- c:\programdata\GreatSoft
2014-02-19 07:12 . 2014-02-19 07:12 -------- d-----w- c:\programdata\weeabsavee
2014-02-19 07:12 . 2014-02-19 07:12 -------- d-----w- c:\program files\weeabsavee
2014-02-18 15:02 . 2014-02-06 07:08 7947048 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2014-02-16 14:51 . 2013-12-19 02:10 94632 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2014-02-12 03:06 . 2013-12-05 02:12 1248768 ----a-w- c:\windows\system32\msxml3.dll
2014-02-11 21:07 . 2014-02-11 21:07 -------- d-----w- c:\users\Andy\AppData\Roaming\TuneUp Software
2014-02-11 21:03 . 2014-02-11 21:08 -------- d-----w- c:\programdata\TuneUp Software
2014-02-11 21:03 . 2014-02-11 21:03 -------- d-sh--w- c:\programdata\{FE8D473A-6F06-4F99-B5F4-BED72B2A038C}
2014-02-11 21:03 . 2014-02-11 21:03 -------- d--h--w- c:\programdata\Common Files
2014-02-11 21:02 . 2014-02-11 21:02 -------- d-----w- c:\users\Andy\AppData\Roaming\Free AVI MPEG WMV MP4 FLV Video Joiner
2014-02-11 21:01 . 2014-02-11 21:02 -------- d-----w- c:\program files\Free AVI MPEG WMV MP4 FLV Video Joiner
2014-02-11 20:58 . 2014-02-11 20:59 -------- d-----w- C:\FLVJoin0.6
2014-02-05 05:31 . 2014-02-05 05:31 -------- d-----w- c:\users\Andy\AppData\Local\FluxSoftware
2014-02-01 15:39 . 2014-02-13 02:44 -------- d-----w- c:\programdata\AllTubeNoAds
2014-02-01 15:39 . 2014-02-01 15:39 -------- d-----w- c:\programdata\fkaocmnpipllpnjiabjiclnfeolknpbb
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-02-05 19:30 . 2013-03-15 17:34 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-02-05 19:30 . 2013-03-15 17:34 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-01-19 07:32 . 2012-10-05 00:16 231584 ------w- c:\windows\system32\MpSigStub.exe
2014-01-17 05:23 . 2014-01-17 05:23 146768 ----a-w- c:\program files\GSSvc.dll
2014-01-17 05:23 . 2014-01-17 05:23 3041792 ----a-w- c:\program files\GS.Enabler
2014-01-02 03:11 . 2014-01-02 03:11 8704 ----a-w- c:\windows\system32\drivers\XAudio.sys.bak
2014-01-02 03:11 . 2014-01-02 03:11 155136 ----a-w- c:\windows\system32\drivers\WUDFRd.sys.bak
2014-01-02 03:11 . 2014-01-02 03:11 66560 ----a-w- c:\windows\system32\drivers\WUDFPf.sys.bak
2014-01-02 03:11 . 2014-01-02 03:11 19968 ----a-w- c:\windows\system32\drivers\WSDScan.sys.bak
2014-01-02 03:11 . 2014-01-02 03:11 16896 ----a-w- c:\windows\system32\drivers\WSDPrint.sys.bak
2014-01-02 03:11 . 2014-01-02 03:11 15872 ----a-w- c:\windows\system32\drivers\ws2ifsl.sys.bak
2014-01-02 03:11 . 2014-01-02 03:10 40448 ----a-w- c:\windows\system32\drivers\WpdUsb.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 17976 ----a-w- c:\windows\system32\drivers\wmilib.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 11264 ----a-w- c:\windows\system32\drivers\wmiacpi.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 34944 ----a-w- c:\windows\system32\drivers\winusb.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 128104 ----a-w- c:\windows\system32\drivers\WimFltr.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 47720 ----a-w- c:\windows\system32\drivers\WdfLdr.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 527064 ----a-w- c:\windows\system32\drivers\Wdf01000.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 22072 ----a-w- c:\windows\system32\drivers\wd.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 33280 ----a-w- c:\windows\system32\drivers\watchdog.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 62464 ----a-w- c:\windows\system32\drivers\wanarp.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 20608 ----a-w- c:\windows\system32\drivers\wacompen.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 987648 ----a-w- c:\windows\system32\drivers\VSTDPV3.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:10 654336 ----a-w- c:\windows\system32\drivers\VSTCNXT3.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:10 200704 ----a-w- c:\windows\system32\drivers\VSTAZL3.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:10 130616 ----a-w- c:\windows\system32\drivers\vsmraid.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 224640 ----a-w- c:\windows\system32\drivers\volsnap.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 292840 ----a-w- c:\windows\system32\drivers\volmgrx.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 52792 ----a-w- c:\windows\system32\drivers\volmgr.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 20024 ----a-w- c:\windows\system32\drivers\viaide.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 110080 ----a-w- c:\windows\system32\drivers\videoprt.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 41472 ----a-w- c:\windows\system32\drivers\viac7.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 56888 ----a-w- c:\windows\system32\drivers\VIAAGP.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:10 26112 ----a-w- c:\windows\system32\drivers\vgapnp.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 25088 ----a-w- c:\windows\system32\drivers\vga.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 134272 ----a-w- c:\windows\system32\drivers\usbvideo.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 23552 ----a-w- c:\windows\system32\drivers\usbuhci.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 65536 ----a-w- c:\windows\system32\drivers\USBSTOR.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:10 18944 ----a-w- c:\windows\system32\drivers\usbprint.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 226304 ----a-w- c:\windows\system32\drivers\usbport.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 19456 ----a-w- c:\windows\system32\drivers\usbohci.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 197632 ----a-w- c:\windows\system32\drivers\usbhub.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 39936 ----a-w- c:\windows\system32\drivers\usbehci.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 6016 ----a-w- c:\windows\system32\drivers\usbd.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 68608 ----a-w- c:\windows\system32\drivers\usbcir.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 73216 ----a-w- c:\windows\system32\drivers\usbccgp.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 25856 ----a-w- c:\windows\system32\drivers\USBCAMD2.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 25856 ----a-w- c:\windows\system32\drivers\USBCAMD.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 45056 ----a-w- c:\windows\system32\drivers\usbaapl.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 15872 ----a-w- c:\windows\system32\drivers\usb8023.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 7680 ----a-w- c:\windows\system32\drivers\umpass.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 34816 ----a-w- c:\windows\system32\drivers\umbus.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 115816 ----a-w- c:\windows\system32\drivers\ulsata2.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 98408 ----a-w- c:\windows\system32\drivers\ulsata.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 238648 ----a-w- c:\windows\system32\drivers\uliahci.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 60984 ----a-w- c:\windows\system32\drivers\ULIAGPKX.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:09 226816 ----a-w- c:\windows\system32\drivers\udfs.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 59448 ----a-w- c:\windows\system32\drivers\UAGP35.SYS.bak
2014-01-02 03:09 . 2014-01-02 03:09 48192 ----a-w- c:\windows\system32\drivers\tvtumon.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 37312 ----a-w- c:\windows\system32\drivers\tvti2c.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 33536 ----a-w- c:\windows\system32\drivers\tvtfilter.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 25088 ----a-w- c:\windows\system32\drivers\tunnel.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 15360 ----a-w- c:\windows\system32\drivers\TUNMP.SYS.bak
2014-01-02 03:09 . 2014-01-02 03:09 24064 ----a-w- c:\windows\system32\drivers\tssecsrv.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 45624 ----a-w- c:\windows\system32\drivers\tpm.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 87328 ----a-w- c:\windows\system32\drivers\TFsFlt.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 53224 ----a-w- c:\windows\system32\drivers\termdd.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 72192 ----a-w- c:\windows\system32\drivers\tdx.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 29184 ----a-w- c:\windows\system32\drivers\tdtcp.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 17920 ----a-w- c:\windows\system32\drivers\tdpipe.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 20992 ----a-w- c:\windows\system32\drivers\tdi.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 31232 ----a-w- c:\windows\system32\drivers\tcpipreg.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 914880 ----a-w- c:\windows\system32\drivers\tcpip.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 34920 ----a-w- c:\windows\system32\drivers\sym_u3.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 24576 ----a-w- c:\windows\system32\drivers\tape.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 31848 ----a-w- c:\windows\system32\drivers\sym_hi.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 35944 ----a-w- c:\windows\system32\drivers\symc8xx.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 15288 ----a-w- c:\windows\system32\drivers\swenum.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 52992 ----a-w- c:\windows\system32\drivers\stream.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 122344 ----a-w- c:\windows\system32\drivers\Storport.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 102400 ----a-w- c:\windows\system32\drivers\srvnet.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 146432 ----a-w- c:\windows\system32\drivers\srv2.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 305152 ----a-w- c:\windows\system32\drivers\srv.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 684032 ----a-w- c:\windows\system32\drivers\spsys.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 21048 ----a-w- c:\windows\system32\drivers\spldr.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 13480 ----a-w- c:\windows\system32\drivers\smiif32.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 17408 ----a-w- c:\windows\system32\drivers\smclib.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 66560 ----a-w- c:\windows\system32\drivers\smb.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 74808 ----a-w- c:\windows\system32\drivers\sisraid4.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 41016 ----a-w- c:\windows\system32\drivers\sisraid2.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 55864 ----a-w- c:\windows\system32\drivers\SISAGP.SYS.bak
2014-01-02 03:09 . 2014-01-02 03:08 13312 ----a-w- c:\windows\system32\drivers\sfloppy.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 11776 ----a-w- c:\windows\system32\drivers\sffp_sd.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 12288 ----a-w- c:\windows\system32\drivers\sffp_mmc.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 13312 ----a-w- c:\windows\system32\drivers\sffdisk.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 19968 ----a-w- c:\windows\system32\drivers\sermouse.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 83456 ----a-w- c:\windows\system32\drivers\serial.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 17920 ----a-w- c:\windows\system32\drivers\serenum.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 20480 ----a-w- c:\windows\system32\drivers\secdrv.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 88576 ----a-w- c:\windows\system32\drivers\sdbus.sys.bak
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{6B896ADB-4A82-46e2-858C-13134782CE34}"= "c:\program files\Xmlbar\Youku Downloader\IEBar\xbietb.dll" [2009-12-15 413696]
.
[HKEY_CLASSES_ROOT\clsid\{6b896adb-4a82-46e2-858c-13134782ce34}]
[HKEY_CLASSES_ROOT\XBIEBar.XBIEBarObj.1]
[HKEY_CLASSES_ROOT\TypeLib\{D4FB30ED-7DDB-4e2c-A7F2-C7B905D5D771}]
[HKEY_CLASSES_ROOT\XBIEBar.XBIEBarObj]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\VeriFace Enc]
@="{771C7324-DA80-49D3-8017-753B0AF60951}"
[HKEY_CLASSES_ROOT\CLSID\{771C7324-DA80-49D3-8017-753B0AF60951}]
2009-03-26 16:30 241752 ------w- c:\windows\System32\IcnOvrly.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"f.lux"="c:\users\Andy\AppData\Local\FluxSoftware\Flux\flux.exe" [2013-10-23 1017224]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TVT Scheduler Proxy"="c:\program files\Common Files\Lenovo\Scheduler\scheduler_proxy.exe" [2008-05-24 487424]
"TPWAUDAP"="c:\program files\Lenovo\HOTKEY\TpWAudAp.exe" [2008-03-11 54560]
"TPFNF7"="c:\program files\Lenovo\NPDIRECT\TPFNF7SP.exe" [2008-07-30 60192]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-07-02 254336]
"SmartAudio"="c:\program files\CONEXANT\SMARTAUDIO\SMAUDIO.EXE" [2008-07-21 2701880]
"PMHandler"="c:\progra~1\Lenovo\PMDriver\PMHandler.exe" [2008-09-23 83240]
"Persistence"="c:\windows\system32\igfxpers.exe" [2012-11-13 173600]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2013-10-23 948440]
"LPManager"="c:\progra~1\Lenovo\LENOVO~2\LPMGR.exe" [2007-04-26 120368]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2013-08-16 152392]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2012-11-13 138784]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2012-11-13 172064]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2008-03-26 163840]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AMSG]
2008-12-20 08:55 449088 ------w- c:\program files\ThinkVantage\AMSG\Amsg.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\APSDaemon]
2013-04-22 01:43 59720 ----a-w- c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Plex Media Server]
2013-01-29 12:28 3858600 ----a-w- c:\program files\Plex\Plex Media Server\Plex Media Server.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VeriFaceManager]
2009-03-26 16:30 323584 ------w- c:\program files\Lenovo\VeriFaceIII\PManage.exe
.
R2 916e5338;GS.Supporter;c:\windows\system32\rundll32.exe [2006-11-02 44544]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - WS2IFSL
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ   PLA DPS BFE mpssvc
LocalServiceAndNoImpersonation REG_MULTI_SZ   FontCache
.
Contents of the 'Scheduled Tasks' folder
.
2014-02-19 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2013-03-15 19:30]
.
2014-02-18 c:\windows\Tasks\GoogleUpdateTaskUserS-1-5-21-2311288496-696126093-1847197915-1003Core.job
- c:\users\Andy\AppData\Local\Google\Update\GoogleUpdate.exe [2012-09-20 22:17]
.
2014-02-03 c:\windows\Tasks\PCDoctorBackgroundMonitorTask.job
- c:\program files\PCDR5\pcdr5cuiw32.exe [2008-12-12 23:32]
.
2014-02-19 c:\windows\Tasks\WS.Booster-S-5195167130.job
- c:\programdata\greatsoft\ws.booster\WS.Booster.exe [2014-02-19 07:12]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
uInternet Settings,ProxyOverride = *.local
IE: {{612F6E5C-B314-4bab-93D1-D266AAFBE700} - c:\program files\Xmlbar\Youku Downloader\YoukuDownloader(xmlbar).exe
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\users\Andy\AppData\Roaming\Mozilla\Firefox\Profiles\4pmb6e19.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: network.proxy.type - 2
.
- - - - ORPHANS REMOVED - - - -
.
Toolbar-Locked - (no file)
ShellIconOverlayIdentifiers-{A8502600-B272-4F68-A67B-A0305D46D297} - (no file)
HKLM-Run-RoxioDragToDisc - c:\program files\Lenovo\Drag-to-Disc\DrgToDsc.exe
SafeBoot-WudfPf
SafeBoot-WudfRd
SafeBoot-QQPCRTP
MSConfigStartUp-DW7 - c:\program files\The Weather Channel\The Weather Channel App\TWCApp.exe
MSConfigStartUp-mobilegeni daemon - c:\program files\Mobogenie\DaemonProcess.exe
MSConfigStartUp-TorrentStream - c:\users\Andy\AppData\Roaming\TorrentStream\engine\tsengine.exe
MSConfigStartUp-uTorrent - c:\users\Andy\Desktop\uTorrent.exe
AddRemove-Coupon Printer for Windows5.0.0.1 - c:\program files\Coupons\uninstall.exe
AddRemove-{CF830981-8F31-C561-C7A0-FE2CE1878B40} - c:\programdata\YoutubeAdblocker\Xy49Ki.exe
AddRemove-????? - c:\users\Andy\AppData\Roaming\baidu\BaiduYunGuanjia\uninst.exe
.
.
.
**************************************************************************
scanning hidden processes ...  
.
scanning hidden autostart entries ... 
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TrueSight]
"ImagePath"="\??\"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*B*D*-N‡eW[U^\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*B*D*-Nñ‚ÌSW[U^\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*c*n*@*Yeg™™>y:S\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*c*o*m*™"Øšnq_Ɖ¤NAm\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.**NYÅ`ñm]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.**NYÅ`ñm\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*NLuÈ~¹p]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*NLuÈ~¹p\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*1**g°e·_ýVª~U_Gr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*2**g°eŽýV¨R\O'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*2**g°eŽýV¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*2**g°eŽýVP``'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*2*ŽýVR*§~œUgR'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*2*ŽýVœUgR'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*-Nñ‚TÍb¨R\OÊ`š`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*-Nñ‚TÍb¨R\OÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ÄOW¯eb‰N¨R\O'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ÄOW¯eb‰N¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eåNr‚RÑy{^'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eO·*pgKQüfR*§~¯rjÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eW/Oyr·*·_<\WœUgR¨R\O'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eW/Oyr·*·_<\WœUgR¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVR*§~P``Ê`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVgRÅ`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¨R\OœUgR1rÅ`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¨R\OœUgR1rÅ`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¨R\O'YGr0]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVGY{^¨R\O'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVGY{^¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVP``¨R\OÊ`š`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVP``¨R\OÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV~p¾–¨R\O’Qi–'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV~p¾–¨R\O’Qi–'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¯rjgRÅ`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¯rjÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*,g·*¯e‚„ÒRGY{^œUgR’Qi–'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*Qh·_Éb·*^mKQ0TN»l·*KQœ<\Ñy{^'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*Qh·_Éb·*^mKQ0TN»l·*KQœ<\Ñy{^'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ÕlýVgRÅ`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ðlŽTÍb¨R\OÊ`š`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ðlŽTÍb¨R\OÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVR*§~¨R\OœUgR'YGr0]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVR*§~¨R\OœUgR'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýV¨R\OÊ`š`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýV¨R\OÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVœUgR'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVGY{^¨R\O’Qi–'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVGY{^¨R\O’Qi–'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVP``'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVÑy{^’Qi–'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVÑy{^'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ñ‚ýVGY{^’Qi–'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ñ‚ýVP``œUgR'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ƒ·*ê^X\R*§~Ñy{^¨R\OÊ`š`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ƒ·*ê^X\R*§~Ñy{^¨R\OÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*4*ŽýVœUgR¨R\O'YGr0]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*4*ŽýVœUgR¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003_Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}]
@Denied: (Full) (Everyone)
"scansk"=hex(0):fd,30,8e,a4,d0,be,4a,43,28,07,17,2b,4d,23,9e,2c,54,ff,31,b8,41,
   75,5a,13,ee,b1,38,71,a2,97,e0,2b,68,a2,32,eb,96,9e,3f,42,00,00,00,00,00,00,\
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003_Classes\CLSID\{5f3d32b3-2a02-4c5d-b1ea-cf43c65d765c}]
@Denied: (Full) (Everyone)
"Model"=dword:00000088
"Therad"=dword:00000007
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_12_0_0_44_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_12_0_0_44_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*1*]
@="?????????????????? v1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*1*\CLSID]
@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*2*]
@="?????????????????? v2"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*2*\CLSID]
@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'Explorer.exe'(2896)
c:\windows\system32\IcnOvrly.dll
.
------------------------ Other Running Processes ------------------------
.
c:\program files\Microsoft Security Client\MsMpEng.exe
c:\windows\system32\WLANExt.exe
c:\program files\ThinkPad\ConnectUtilities\AcPrfMgrSvc.exe
c:\program files\Microsoft Small Business\Business Contact Manager\BcmSqlStartupSvc.exe
c:\program files\LENOVO\HOTKEY\FNF5SVC.exe
c:\program files\Common Files\InterVideo\RegMgr\iviRegMgr.exe
c:\program files\Lenovo\PMDriver\PMSveH.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlbrowser.exe
c:\program files\Microsoft SQL Server\90\Shared\sqlwriter.exe
c:\program files\TeamViewer\Version8\TeamViewer_Service.exe
c:\program files\Common Files\Lenovo\tvt_reg_monitor_svc.exe
c:\program files\LENOVO\HOTKEY\TPHKSVC.exe
c:\program files\Lenovo\Rescue and Recovery\rrpservice.exe
c:\program files\Lenovo\Rescue and Recovery\rrservice.exe
c:\program files\Common Files\Lenovo\Scheduler\tvtsched.exe
c:\windows\system32\DRIVERS\xaudio.exe
c:\program files\ThinkPad\ConnectUtilities\AcSvc.exe
c:\program files\Lenovo\System Update\SUService.exe
c:\program files\TeamViewer\Version8\TeamViewer.exe
c:\program files\TeamViewer\Version8\tv_w32.exe
c:\windows\system32\conime.exe
c:\windows\system32\igfxsrvc.exe
c:\windows\system32\conime.exe
c:\program files\teamviewer\version8\TeamViewer_Desktop.exe
.
**************************************************************************
.
Completion time: 2014-02-19  18:00:43 - machine was rebooted
ComboFix-quarantined-files.txt  2014-02-19 22:57
.
Pre-Run: 27,207,479,296 bytes free
Post-Run: 27,346,976,768 bytes free
.
- - End Of File - - 3E4A7BB29DC192DD33FAA871D5FF19F3
09E5BBC1F36BA580385812493FCFBD6A


#6 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:12 AM

Posted 19 February 2014 - 08:47 PM


Hello dadscomp

We need to reset Chrome back to defaults to completely clear out what is going on.

We can keep the bookmarks by exporting them - Export Bookmarks


Then I need you to go Google Sync and sign into your account

scroll down untill you see the "Stop and Clear" button and click on button

At the prompt click on "Ok"

Now we need to uninstall chrome

I want you to uninstall Chrome and if asked about user data or settings then remove this also

restart the computer and reinstall chrome, You can download The latest version from here - Google Chrome

After you have Chrome reinstalled please check things out and let me know how it is doing.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#7 dadscomp

dadscomp
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:01:12 AM

Posted 19 February 2014 - 10:21 PM

Hi Gringo!

 

Everything looks great and is working fine now. Thanks so much for your help! Were my logs clean as well?



#8 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:12 AM

Posted 19 February 2014 - 10:38 PM


Hello dadscomp

At this time I would like you to run this script for me and it is a good time to check out the computer to see if there is anything else that needs to be addressed.

:Run CFScript:

Please start by opening Notepad and copy/paste the text in the box into the window:

ClearJavaCache::


 
Save it to your desktop as CFScript.txt

Referring to the picture above, drag CFScript.txt into ComboFix.exe
CFScriptB-4.gif
This will let ComboFix run again.
Restart if you have to.
Save the produced logfile to your desktop.

Note: Do not mouseclick combofix's window whilst it's running. That may cause it to stall

Note 2: If you receive an error "Illegal operation attempted on a registry key that has been marked for deletion." Please restart the computer

"information and logs"
  • In your next post I need the following
    • report from Combofix
    • let me know of any problems you may have had
    • How is the computer doing now after running the script?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#9 dadscomp

dadscomp
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:01:12 AM

Posted 19 February 2014 - 11:04 PM

Hi Gringo!

 

Everything is working fine. Not noticing any signs of malware, adware, etc. :)

 

 

ComboFix 14-02-19.01 - Andy 02/19/2014  22:44:50.2.2 - x86
Microsoft® Windows Vista™ Home Basic   6.0.6002.2.1252.1.1033.18.2008.957 [GMT -5:00]
Running from: c:\users\Andy\Desktop\ComboFix.exe
Command switches used :: c:\users\Andy\Desktop\CFScript.txt
AV: Microsoft Security Essentials *Disabled/Updated* {641105E6-77ED-3F35-A304-765193BCB75F}
SP: Microsoft Security Essentials *Disabled/Updated* {DF70E402-51D7-30BB-99B4-4D23E83BFDE2}
SP: Windows Defender *Disabled/Outdated* {D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
 * Created a new restore point
.
.
(((((((((((((((((((((((((   Files Created from 2014-01-20 to 2014-02-20  )))))))))))))))))))))))))))))))
.
.
2014-02-20 03:54 . 2014-02-20 03:54 -------- d-----w- c:\users\Default\AppData\Local\temp
2014-02-20 03:41 . 2014-02-20 03:41 39464 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{7C1A3DC2-867F-4EF4-843A-47575A9B2A31}\MpKsl137a580f.sys
2014-02-20 03:14 . 2014-02-20 03:15 -------- d-----w- c:\program files\Google
2014-02-20 03:13 . 2014-02-06 07:08 7947048 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{7C1A3DC2-867F-4EF4-843A-47575A9B2A31}\mpengine.dll
2014-02-19 23:01 . 2014-02-20 03:55 -------- d-----w- c:\users\Andy\AppData\Local\temp
2014-02-19 22:00 . 2014-02-19 21:59 765968 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\{2B2D10CF-B7CA-4238-8E2D-E36F56BCB094}\gapaengine.dll
2014-02-19 21:52 . 2014-02-19 21:52 -------- d-----w- c:\windows\ERUNT
2014-02-19 07:13 . 2014-02-19 07:13 -------- d-----w- c:\users\Andy\AppData\Roaming\Solveig Multimedia
2014-02-19 07:12 . 2014-02-19 07:13 -------- d-----w- c:\programdata\GreatSoft
2014-02-19 07:12 . 2014-02-19 07:12 -------- d-----w- c:\programdata\weeabsavee
2014-02-19 07:12 . 2014-02-19 07:12 -------- d-----w- c:\program files\weeabsavee
2014-02-18 15:02 . 2014-02-06 07:08 7947048 ----a-w- c:\programdata\Microsoft\Microsoft Antimalware\Definition Updates\Backup\mpengine.dll
2014-02-16 14:51 . 2013-12-19 02:10 94632 ----a-w- c:\windows\system32\WindowsAccessBridge.dll
2014-02-12 03:06 . 2013-12-05 02:12 1248768 ----a-w- c:\windows\system32\msxml3.dll
2014-02-11 21:07 . 2014-02-11 21:07 -------- d-----w- c:\users\Andy\AppData\Roaming\TuneUp Software
2014-02-11 21:03 . 2014-02-11 21:08 -------- d-----w- c:\programdata\TuneUp Software
2014-02-11 21:03 . 2014-02-11 21:03 -------- d-sh--w- c:\programdata\{FE8D473A-6F06-4F99-B5F4-BED72B2A038C}
2014-02-11 21:03 . 2014-02-11 21:03 -------- d--h--w- c:\programdata\Common Files
2014-02-11 21:02 . 2014-02-11 21:02 -------- d-----w- c:\users\Andy\AppData\Roaming\Free AVI MPEG WMV MP4 FLV Video Joiner
2014-02-11 21:01 . 2014-02-11 21:02 -------- d-----w- c:\program files\Free AVI MPEG WMV MP4 FLV Video Joiner
2014-02-11 20:58 . 2014-02-11 20:59 -------- d-----w- C:\FLVJoin0.6
2014-02-05 05:31 . 2014-02-05 05:31 -------- d-----w- c:\users\Andy\AppData\Local\FluxSoftware
2014-02-01 15:39 . 2014-02-13 02:44 -------- d-----w- c:\programdata\AllTubeNoAds
2014-02-01 15:39 . 2014-02-01 15:39 -------- d-----w- c:\programdata\fkaocmnpipllpnjiabjiclnfeolknpbb
.
.
.
((((((((((((((((((((((((((((((((((((((((   Find3M Report   ))))))))))))))))))))))))))))))))))))))))))))))))))))
.
2014-02-05 19:30 . 2013-03-15 17:34 71048 ----a-w- c:\windows\system32\FlashPlayerCPLApp.cpl
2014-02-05 19:30 . 2013-03-15 17:34 692616 ----a-w- c:\windows\system32\FlashPlayerApp.exe
2014-01-19 07:32 . 2012-10-05 00:16 231584 ------w- c:\windows\system32\MpSigStub.exe
2014-01-17 05:23 . 2014-01-17 05:23 146768 ----a-w- c:\program files\GSSvc.dll
2014-01-17 05:23 . 2014-01-17 05:23 3041792 ----a-w- c:\program files\GS.Enabler
2014-01-02 03:11 . 2014-01-02 03:11 8704 ----a-w- c:\windows\system32\drivers\XAudio.sys.bak
2014-01-02 03:11 . 2014-01-02 03:11 155136 ----a-w- c:\windows\system32\drivers\WUDFRd.sys.bak
2014-01-02 03:11 . 2014-01-02 03:11 66560 ----a-w- c:\windows\system32\drivers\WUDFPf.sys.bak
2014-01-02 03:11 . 2014-01-02 03:11 19968 ----a-w- c:\windows\system32\drivers\WSDScan.sys.bak
2014-01-02 03:11 . 2014-01-02 03:11 16896 ----a-w- c:\windows\system32\drivers\WSDPrint.sys.bak
2014-01-02 03:11 . 2014-01-02 03:11 15872 ----a-w- c:\windows\system32\drivers\ws2ifsl.sys.bak
2014-01-02 03:11 . 2014-01-02 03:10 40448 ----a-w- c:\windows\system32\drivers\WpdUsb.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 17976 ----a-w- c:\windows\system32\drivers\wmilib.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 11264 ----a-w- c:\windows\system32\drivers\wmiacpi.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 34944 ----a-w- c:\windows\system32\drivers\winusb.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 128104 ----a-w- c:\windows\system32\drivers\WimFltr.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 47720 ----a-w- c:\windows\system32\drivers\WdfLdr.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 527064 ----a-w- c:\windows\system32\drivers\Wdf01000.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 22072 ----a-w- c:\windows\system32\drivers\wd.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 33280 ----a-w- c:\windows\system32\drivers\watchdog.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 62464 ----a-w- c:\windows\system32\drivers\wanarp.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 20608 ----a-w- c:\windows\system32\drivers\wacompen.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 987648 ----a-w- c:\windows\system32\drivers\VSTDPV3.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:10 654336 ----a-w- c:\windows\system32\drivers\VSTCNXT3.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:10 200704 ----a-w- c:\windows\system32\drivers\VSTAZL3.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:10 130616 ----a-w- c:\windows\system32\drivers\vsmraid.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 224640 ----a-w- c:\windows\system32\drivers\volsnap.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 292840 ----a-w- c:\windows\system32\drivers\volmgrx.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 52792 ----a-w- c:\windows\system32\drivers\volmgr.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 20024 ----a-w- c:\windows\system32\drivers\viaide.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 110080 ----a-w- c:\windows\system32\drivers\videoprt.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 41472 ----a-w- c:\windows\system32\drivers\viac7.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 56888 ----a-w- c:\windows\system32\drivers\VIAAGP.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:10 26112 ----a-w- c:\windows\system32\drivers\vgapnp.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 25088 ----a-w- c:\windows\system32\drivers\vga.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 134272 ----a-w- c:\windows\system32\drivers\usbvideo.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 23552 ----a-w- c:\windows\system32\drivers\usbuhci.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 65536 ----a-w- c:\windows\system32\drivers\USBSTOR.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:10 18944 ----a-w- c:\windows\system32\drivers\usbprint.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 226304 ----a-w- c:\windows\system32\drivers\usbport.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 19456 ----a-w- c:\windows\system32\drivers\usbohci.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 197632 ----a-w- c:\windows\system32\drivers\usbhub.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 39936 ----a-w- c:\windows\system32\drivers\usbehci.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 6016 ----a-w- c:\windows\system32\drivers\usbd.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 68608 ----a-w- c:\windows\system32\drivers\usbcir.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 73216 ----a-w- c:\windows\system32\drivers\usbccgp.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 25856 ----a-w- c:\windows\system32\drivers\USBCAMD2.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 25856 ----a-w- c:\windows\system32\drivers\USBCAMD.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 45056 ----a-w- c:\windows\system32\drivers\usbaapl.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 15872 ----a-w- c:\windows\system32\drivers\usb8023.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 7680 ----a-w- c:\windows\system32\drivers\umpass.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 34816 ----a-w- c:\windows\system32\drivers\umbus.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 115816 ----a-w- c:\windows\system32\drivers\ulsata2.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 98408 ----a-w- c:\windows\system32\drivers\ulsata.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 238648 ----a-w- c:\windows\system32\drivers\uliahci.sys.bak
2014-01-02 03:10 . 2014-01-02 03:10 60984 ----a-w- c:\windows\system32\drivers\ULIAGPKX.SYS.bak
2014-01-02 03:10 . 2014-01-02 03:09 226816 ----a-w- c:\windows\system32\drivers\udfs.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 59448 ----a-w- c:\windows\system32\drivers\UAGP35.SYS.bak
2014-01-02 03:09 . 2014-01-02 03:09 48192 ----a-w- c:\windows\system32\drivers\tvtumon.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 37312 ----a-w- c:\windows\system32\drivers\tvti2c.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 33536 ----a-w- c:\windows\system32\drivers\tvtfilter.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 25088 ----a-w- c:\windows\system32\drivers\tunnel.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 15360 ----a-w- c:\windows\system32\drivers\TUNMP.SYS.bak
2014-01-02 03:09 . 2014-01-02 03:09 24064 ----a-w- c:\windows\system32\drivers\tssecsrv.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 45624 ----a-w- c:\windows\system32\drivers\tpm.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 87328 ----a-w- c:\windows\system32\drivers\TFsFlt.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 53224 ----a-w- c:\windows\system32\drivers\termdd.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 72192 ----a-w- c:\windows\system32\drivers\tdx.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 29184 ----a-w- c:\windows\system32\drivers\tdtcp.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 17920 ----a-w- c:\windows\system32\drivers\tdpipe.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 20992 ----a-w- c:\windows\system32\drivers\tdi.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 31232 ----a-w- c:\windows\system32\drivers\tcpipreg.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 914880 ----a-w- c:\windows\system32\drivers\tcpip.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 34920 ----a-w- c:\windows\system32\drivers\sym_u3.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 24576 ----a-w- c:\windows\system32\drivers\tape.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 31848 ----a-w- c:\windows\system32\drivers\sym_hi.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 35944 ----a-w- c:\windows\system32\drivers\symc8xx.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 15288 ----a-w- c:\windows\system32\drivers\swenum.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 52992 ----a-w- c:\windows\system32\drivers\stream.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 122344 ----a-w- c:\windows\system32\drivers\Storport.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 102400 ----a-w- c:\windows\system32\drivers\srvnet.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 146432 ----a-w- c:\windows\system32\drivers\srv2.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 305152 ----a-w- c:\windows\system32\drivers\srv.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 684032 ----a-w- c:\windows\system32\drivers\spsys.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 21048 ----a-w- c:\windows\system32\drivers\spldr.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 13480 ----a-w- c:\windows\system32\drivers\smiif32.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 17408 ----a-w- c:\windows\system32\drivers\smclib.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 66560 ----a-w- c:\windows\system32\drivers\smb.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 74808 ----a-w- c:\windows\system32\drivers\sisraid4.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 41016 ----a-w- c:\windows\system32\drivers\sisraid2.sys.bak
2014-01-02 03:09 . 2014-01-02 03:09 55864 ----a-w- c:\windows\system32\drivers\SISAGP.SYS.bak
2014-01-02 03:09 . 2014-01-02 03:08 13312 ----a-w- c:\windows\system32\drivers\sfloppy.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 11776 ----a-w- c:\windows\system32\drivers\sffp_sd.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 12288 ----a-w- c:\windows\system32\drivers\sffp_mmc.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 13312 ----a-w- c:\windows\system32\drivers\sffdisk.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 19968 ----a-w- c:\windows\system32\drivers\sermouse.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 83456 ----a-w- c:\windows\system32\drivers\serial.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 17920 ----a-w- c:\windows\system32\drivers\serenum.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 20480 ----a-w- c:\windows\system32\drivers\secdrv.sys.bak
2014-01-02 03:08 . 2014-01-02 03:08 88576 ----a-w- c:\windows\system32\drivers\sdbus.sys.bak
.
.
(((((((((((((((((((((((((((((((((((((   Reg Loading Points   ))))))))))))))))))))))))))))))))))))))))))))))))))
.
.
*Note* empty entries & legit default entries are not shown 
REGEDIT4
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Internet Explorer\Toolbar]
"{6B896ADB-4A82-46e2-858C-13134782CE34}"= "c:\program files\Xmlbar\Youku Downloader\IEBar\xbietb.dll" [2009-12-15 413696]
.
[HKEY_CLASSES_ROOT\clsid\{6b896adb-4a82-46e2-858c-13134782ce34}]
[HKEY_CLASSES_ROOT\XBIEBar.XBIEBarObj.1]
[HKEY_CLASSES_ROOT\TypeLib\{D4FB30ED-7DDB-4e2c-A7F2-C7B905D5D771}]
[HKEY_CLASSES_ROOT\XBIEBar.XBIEBarObj]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\explorer\shelliconoverlayidentifiers\VeriFace Enc]
@="{771C7324-DA80-49D3-8017-753B0AF60951}"
[HKEY_CLASSES_ROOT\CLSID\{771C7324-DA80-49D3-8017-753B0AF60951}]
2009-03-26 16:30 241752 ------w- c:\windows\System32\IcnOvrly.dll
.
[HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"f.lux"="c:\users\Andy\AppData\Local\FluxSoftware\Flux\flux.exe" [2013-10-23 1017224]
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run]
"TVT Scheduler Proxy"="c:\program files\Common Files\Lenovo\Scheduler\scheduler_proxy.exe" [2008-05-24 487424]
"TPWAUDAP"="c:\program files\Lenovo\HOTKEY\TpWAudAp.exe" [2008-03-11 54560]
"TPFNF7"="c:\program files\Lenovo\NPDIRECT\TPFNF7SP.exe" [2008-07-30 60192]
"SunJavaUpdateSched"="c:\program files\Common Files\Java\Java Update\jusched.exe" [2013-07-02 254336]
"SmartAudio"="c:\program files\CONEXANT\SMARTAUDIO\SMAUDIO.EXE" [2008-07-21 2701880]
"PMHandler"="c:\progra~1\Lenovo\PMDriver\PMHandler.exe" [2008-09-23 83240]
"Persistence"="c:\windows\system32\igfxpers.exe" [2012-11-13 173600]
"MSC"="c:\program files\Microsoft Security Client\msseces.exe" [2013-10-23 948440]
"LPManager"="c:\progra~1\Lenovo\LENOVO~2\LPMGR.exe" [2007-04-26 120368]
"iTunesHelper"="c:\program files\iTunes\iTunesHelper.exe" [2013-08-16 152392]
"IgfxTray"="c:\windows\system32\igfxtray.exe" [2012-11-13 138784]
"HotKeysCmds"="c:\windows\system32\hkcmd.exe" [2012-11-13 172064]
"Apoint"="c:\program files\Apoint2K\Apoint.exe" [2008-03-26 163840]
"Adobe Reader Speed Launcher"="c:\program files\Adobe\Reader 9.0\Reader\Reader_sl.exe" [2008-06-12 34672]
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows\currentversion\policies\system]
"EnableUIADesktopToggle"= 0 (0x0)
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\MsMpSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\Wdf01000.sys]
@="Driver"
.
[HKEY_LOCAL_MACHINE\SYSTEM\CurrentControlSet\Control\SafeBoot\Minimal\WudfSvc]
@="Service"
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\AMSG]
2008-12-20 08:55 449088 ------w- c:\program files\ThinkVantage\AMSG\Amsg.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\APSDaemon]
2013-04-22 01:43 59720 ----a-w- c:\program files\Common Files\Apple\Apple Application Support\APSDaemon.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\Plex Media Server]
2013-01-29 12:28 3858600 ----a-w- c:\program files\Plex\Plex Media Server\Plex Media Server.exe
.
[HKEY_LOCAL_MACHINE\software\microsoft\shared tools\msconfig\startupreg\VeriFaceManager]
2009-03-26 16:30 323584 ------w- c:\program files\Lenovo\VeriFaceIII\PManage.exe
.
R2 916e5338;GS.Supporter;c:\windows\system32\rundll32.exe [2006-11-02 44544]
.
.
--- Other Services/Drivers In Memory ---
.
*NewlyCreated* - MPKSL137A580F
.
[HKEY_LOCAL_MACHINE\software\microsoft\windows nt\currentversion\svchost]
LocalServiceNoNetwork REG_MULTI_SZ   PLA DPS BFE mpssvc
LocalServiceAndNoImpersonation REG_MULTI_SZ   FontCache
.
[HKEY_LOCAL_MACHINE\software\microsoft\active setup\installed components\{8A69D345-D564-463c-AFF1-A69D9E530F96}]
2014-02-20 03:15 1211720 ----a-w- c:\program files\Google\Chrome\Application\32.0.1700.107\Installer\chrmstp.exe
.
Contents of the 'Scheduled Tasks' folder
.
2014-02-20 c:\windows\Tasks\Adobe Flash Player Updater.job
- c:\windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe [2013-03-15 19:30]
.
2014-02-20 c:\windows\Tasks\GoogleUpdateTaskMachineCore.job
- c:\program files\Google\Update\GoogleUpdate.exe [2014-02-20 03:14]
.
2014-02-20 c:\windows\Tasks\GoogleUpdateTaskMachineUA.job
- c:\program files\Google\Update\GoogleUpdate.exe [2014-02-20 03:14]
.
2014-02-03 c:\windows\Tasks\PCDoctorBackgroundMonitorTask.job
- c:\program files\PCDR5\pcdr5cuiw32.exe [2008-12-12 23:32]
.
2014-02-20 c:\windows\Tasks\WS.Booster-S-5195167130.job
- c:\programdata\greatsoft\ws.booster\WS.Booster.exe [2014-02-19 07:12]
.
.
------- Supplementary Scan -------
.
uStart Page = hxxp://www.google.com
mStart Page = hxxp://www.google.com
uInternet Settings,ProxyOverride = *.local
IE: {{612F6E5C-B314-4bab-93D1-D266AAFBE700} - c:\program files\Xmlbar\Youku Downloader\YoukuDownloader(xmlbar).exe
TCP: DhcpNameServer = 192.168.1.1
FF - ProfilePath - c:\users\Andy\AppData\Roaming\Mozilla\Firefox\Profiles\4pmb6e19.default\
FF - prefs.js: browser.startup.homepage - hxxp://www.google.com/
FF - prefs.js: network.proxy.type - 2
.
- - - - ORPHANS REMOVED - - - -
.
AddRemove-????? - c:\users\Andy\AppData\Roaming\baidu\BaiduYunGuanjia\uninst.exe
.
.
.
**************************************************************************
.
catchme 0.3.1398 W2K/XP/Vista - rootkit/stealth malware detector by Gmer, http://www.gmer.net
Rootkit scan 2014-02-19 22:55
Windows 6.0.6002 Service Pack 2 NTFS
.
scanning hidden processes ...  
.
scanning hidden autostart entries ... 
.
scanning hidden files ...  
.
scan completed successfully
hidden files: 0
.
**************************************************************************
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\TrueSight]
"ImagePath"="\??\"
.
--------------------- LOCKED REGISTRY KEYS ---------------------
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*B*D*-N‡eW[U^\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*B*D*-Nñ‚ÌSW[U^\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*c*n*@*Yeg™™>y:S\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*c*o*m*™"Øšnq_Ɖ¤NAm\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.**NYÅ`ñm]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.**NYÅ`ñm\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*NLuÈ~¹p]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*NLuÈ~¹p\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*1**g°e·_ýVª~U_Gr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*2**g°eŽýV¨R\O'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*2**g°eŽýV¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*2**g°eŽýVP``'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*2*ŽýVR*§~œUgR'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*2*ŽýVœUgR'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*-Nñ‚TÍb¨R\OÊ`š`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*-Nñ‚TÍb¨R\OÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ÄOW¯eb‰N¨R\O'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ÄOW¯eb‰N¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eåNr‚RÑy{^'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eO·*pgKQüfR*§~¯rjÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eW/Oyr·*·_<\WœUgR¨R\O'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eW/Oyr·*·_<\WœUgR¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVR*§~P``Ê`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVgRÅ`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¨R\OœUgR1rÅ`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¨R\OœUgR1rÅ`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¨R\O'YGr0]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVGY{^¨R\O'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVGY{^¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVP``¨R\OÊ`š`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVP``¨R\OÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýVÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV~p¾–¨R\O’Qi–'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV~p¾–¨R\O’Qi–'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¯rjgRÅ`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3**g°eŽýV¯rjÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*,g·*¯e‚„ÒRGY{^œUgR’Qi–'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*Qh·_Éb·*^mKQ0TN»l·*KQœ<\Ñy{^'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*Qh·_Éb·*^mKQ0TN»l·*KQœ<\Ñy{^'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ÕlýVgRÅ`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ðlŽTÍb¨R\OÊ`š`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ðlŽTÍb¨R\OÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVR*§~¨R\OœUgR'YGr0]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVR*§~¨R\OœUgR'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýV¨R\OÊ`š`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýV¨R\OÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVœUgR'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVGY{^¨R\O’Qi–'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVGY{^¨R\O’Qi–'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVP``'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVÑy{^’Qi–'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ŽýVÑy{^'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ñ‚ýVGY{^’Qi–'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ñ‚ýVP``œUgR'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ƒ·*ê^X\R*§~Ñy{^¨R\OÊ`š`'YGr0]
@Class="Shell"
@Allowed: (Read) (RestrictedCode)
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*3*ƒ·*ê^X\R*§~Ñy{^¨R\OÊ`š`'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*4*ŽýVœUgR¨R\O'YGr0]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.*-NW[002*0*1*4*ŽýVœUgR¨R\O'YGr0\OpenWithList]
@Class="Shell"
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003_Classes\CLSID\{5ED60779-4DE2-4E07-B862-974CA4FF2E9C}]
@Denied: (Full) (Everyone)
"scansk"=hex(0):fd,30,8e,a4,d0,be,4a,43,28,07,17,2b,4d,23,9e,2c,54,ff,31,b8,41,
   75,5a,13,ee,b1,38,71,a2,97,e0,2b,68,a2,32,eb,96,9e,3f,42,00,00,00,00,00,00,\
.
[HKEY_USERS\S-1-5-21-2311288496-696126093-1847197915-1003_Classes\CLSID\{5f3d32b3-2a02-4c5d-b1ea-cf43c65d765c}]
@Denied: (Full) (Everyone)
"Model"=dword:00000088
"Therad"=dword:00000007
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="FlashBroker"
"LocalizedString"="@c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_12_0_0_44_ActiveX.exe,-101"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\Elevation]
"Enabled"=dword:00000001
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\LocalServer32]
@="c:\\Windows\\system32\\Macromed\\Flash\\FlashUtil32_12_0_0_44_ActiveX.exe"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{73C9DFA0-750D-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}]
@Denied: (A 2) (Everyone)
@="IFlashBroker5"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\ProxyStubClsid32]
@="{00020424-0000-0000-C000-000000000046}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Interface\{6AE38AE0-750C-11E1-B0C4-0800200C9A66}\TypeLib]
@="{FAB3E735-69C7-453B-A446-B6823C6DF1C9}"
"Version"="1.0"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*1*]
@="?????????????????? v1"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*1*\CLSID]
@="{E23FE9C6-778E-49D4-B537-38FCDE4887D8}"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*2*]
@="?????????????????? v2"
.
[HKEY_LOCAL_MACHINE\SOFTWARE\Classes\VideoLAN.VLCPlugin.*2*\CLSID]
@="{9BE31822-FDAD-461B-AD51-BE1D1C159921}"
.
[HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E96D-E325-11CE-BFC1-08002BE10318}\0000\AllUserSettings]
@Denied: (A) (Users)
@Denied: (A) (Everyone)
@Allowed: (B 1 2 3 4 5) (S-1-5-20)
"BlindDial"=dword:00000000
.
--------------------- DLLs Loaded Under Running Processes ---------------------
.
- - - - - - - > 'Explorer.exe'(4816)
c:\windows\system32\IcnOvrly.dll
.
Completion time: 2014-02-19  22:57:31
ComboFix-quarantined-files.txt  2014-02-20 03:57
ComboFix2.txt  2014-02-19 23:01
.
Pre-Run: 24,732,143,616 bytes free
Post-Run: 24,713,654,272 bytes free
.
- - End Of File - - 08B1987ADD90F61F730D3E15D134EB44
09E5BBC1F36BA580385812493FCFBD6A


#10 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:12 AM

Posted 21 February 2014 - 07:43 AM



Hello

:P2P Warning!:

IMPORTANT I notice there are signs of one or more P2P (Person to Person) File Sharing Programs on your computer.

Please note that as long as you are using any form of Peer-to-Peer networking and downloading files from non-documented sources, you can expect infestations of malware to occur
Once upon a time, P2P file sharing was fairly safe. That is no longer true. P2P programs form a direct conduit on to your computer, their security measures are easily circumvented and malware writers are increasingly exploiting them to spread their wares on to your computer. Further to that, if your P2P program is not configured correctly, your computer may be sharing more files than you realize. There have been cases where people's passwords, address books and other personal, private, and financial details have been exposed to a file sharing network by a badly configured program.

Please read these short reports on the dangers of peer-2-peer programs and file sharing.These logs are looking allot better. But we still have some work to do.


uninstall some programs

NOTE** Because of the cleanup process some of the programs I have listed may not be in add/remove anymore this is fine just move to the next item on the list.

You can remove these programs using add/remove or you can use the free uninstaller from Revo (it does allot better of a job
  • Programs to remove

    • µTorrent
      Adobe Reader 9
      Coupon Printer for Windows



  • Please download and install Revo Uninstaller Free
  • Double click Revo Uninstaller to run it.
  • From the list of programs double click on The Program to remove
  • When prompted if you want to uninstall click Yes.
  • Be sure the Moderate option is selected then click Next.
  • The program will run, If prompted again click Yes
  • when the built-in uninstaller is finished click on Next.
  • Once the program has searched for leftovers click Next.
  • Check/tick the bolded items only on the list then click Delete
  • when prompted click on Yes and then on next.
  • put a check on any folders that are found and select delete
  • when prompted select yes then on next
  • Once done click Finish.
.


Update Adobe reader
  • Recently there have been vulnerabilities detected in older versions of Adobe Reader. It is strongly suggested that you update to the current version.

    You can download it from http://www.adobe.com/products/acrobat/readstep2.html
    After installing the latest Adobe Reader, uninstall all previous versions.
    If you already have Adobe Photoshop® Album Starter Edition installed or do not wish to have it installed UNcheck the box which says Also Download Adobe Photoshop® Album Starter Edition.
    • If you don't like Adobe Reader (53 MB), you can download Foxit PDF Reader(7 MB) from here. It's a much smaller file to download and uses a lot less resources than Adobe Reader.

      Note: When installing FoxitReader, be careful not to install anything to do with AskBar.

Clean Out Temp Files
  • This small application you may want to keep and use once a week to keep the computer clean.

    Download CCleaner from here CCleaner
    • Run the installer to install the application.
    • When it gives you the option to install Yahoo toolbar uncheck the box next to it.
    • Run CCleaner. (make sure under Windows tab all the boxes of Internet Explorer and Windows explorer are checked. Under System check Empty Recycle Bin and Temporary Files. Under Application tab all the boxes should be checked).
    • Click Run Cleaner.
    • Close CCleaner.
: Malwarebytes' Anti-Malware :

I see you have MBAM installed - I think this is a great program and would like you to run a quick scan at this time
  • Double-click mbam icon
  • go to the update tab at the top
  • click on check for updates
  • If an update is found, it will download and install the latest version.
  • Once the program has loaded, select Perform quick scan, then click Scan.
  • When the scan is complete, click OK, then Show Results to view the results.
  • Be sure that everything is Checked (ticked) except items in the C:\System Volume Information folder and click on Remove Selected.
  • When completed, a log will open in Notepad. please copy and paste the log into your next reply
    • If you accidentally close it, the log file is saved here and will be named like this:
    • C:\Documents and Settings\Username\Application Data\Malwarebytes\Malwarebytes' Anti-Malware\Logs\mbam-log-date (time).txt
Note: If MBAM encounters a file that is difficult to remove, you will be presented with 1 of 2 prompts.
Click OK to either and let MBAM proceed with the disinfection process.
If asked to restart the computer, please do so immediately. Failure to reboot will prevent MBAM from removing all the malware.




Download HijackThis
  • Go Here to download HijackThis program
  • Save HijackThis to your desktop.
  • Right Click on Hijackthis and select "Run as Admin" (XP users just need to double click to run)
  • Click on "Do A system scan and save a logfile" (if you do not see "Do A system scan and save a logfile" then click on main menu)
  • copy and paste hijackthis report into the topic
"information and logs"
  • In your next post I need the following
    • Log From MBAM
    • report from Hijackthis
    • let me know of any problems you may have had
    • How is the computer doing now?
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#11 dadscomp

dadscomp
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:01:12 AM

Posted 21 February 2014 - 10:36 PM

Hi Gringo,

 

I've uninstalled all of the software you listed except for the 'Coupon Printer for Windows'. I could not find it in Revo Uninstaller or the Add/Remove Programs in the Control Panel. The computer seems to be running just fine! I really appreciate all the help you've been so far. :)

 

I noticed my dad installed the software named 'baidu' again last night. I think he wants to keep it, will that be okay?

 

Thanks!

 

 

 

Malwarebytes Anti-Malware 1.75.0.1300
www.malwarebytes.org
 
Database version: v2014.02.22.01
 
Windows Vista Service Pack 2 x86 NTFS
Internet Explorer 9.0.8112.16421
Andy :: JULIE-PC [administrator]
 
2/21/2014 10:13:22 PM
mbam-log-2014-02-21 (22-13-22).txt
 
Scan type: Quick scan
Scan options enabled: Memory | Startup | Registry | File System | Heuristics/Extra | Heuristics/Shuriken | PUP | PUM
Scan options disabled: P2P
Objects scanned: 223216
Time elapsed: 10 minute(s), 36 second(s)
 
Memory Processes Detected: 0
(No malicious items detected)
 
Memory Modules Detected: 0
(No malicious items detected)
 
Registry Keys Detected: 2
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\S-5195167130 (PUP.Optional.MultiPlug.A) -> Quarantined and deleted successfully.
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{476D78C4-1DB0-2D88-7FCC-AA6559F59A8D} (PUP.Optional.MultiPlug.A) -> Quarantined and deleted successfully.
 
Registry Values Detected: 0
(No malicious items detected)
 
Registry Data Items Detected: 0
(No malicious items detected)
 
Folders Detected: 0
(No malicious items detected)
 
Files Detected: 2
C:\ProgramData\GreatSoft\WS.Booster\WS.Booster.exe (PUP.Optional.MultiPlug.A) -> Quarantined and deleted successfully.
C:\ProgramData\weeabsavee\XMGsZERz.exe (PUP.Optional.MultiPlug.A) -> Quarantined and deleted successfully.
 
(end)
 
 
 
Logfile of Trend Micro HijackThis v2.0.4
Scan saved at 10:32:57 PM, on 2/21/2014
Platform: Windows Vista SP2 (WinNT 6.00.1906)
MSIE: Internet Explorer v9.00 (9.00.8112.16533)
Boot mode: Normal
 
Running processes:
C:\Windows\system32\Dwm.exe
C:\Windows\Explorer.EXE
C:\Windows\system32\taskeng.exe
C:\Program Files\Common Files\Lenovo\Scheduler\scheduler_proxy.exe
C:\Program Files\Lenovo\HOTKEY\TpWAudAp.exe
C:\Program Files\Lenovo\NPDIRECT\tpfnf7sp.exe
C:\Program Files\Common Files\Java\Java Update\jusched.exe
C:\Program Files\CONEXANT\SmartAudio\SmAudio.exe
C:\Program Files\Lenovo\PMDriver\PMHandler.exe
C:\Windows\System32\igfxpers.exe
C:\Program Files\Microsoft Security Client\msseces.exe
C:\Program Files\Lenovo\LenovoCare\LPMGR.EXE
C:\Windows\system32\igfxsrvc.exe
C:\Windows\System32\hkcmd.exe
C:\Program Files\Apoint2K\Apoint.exe
C:\Users\Andy\AppData\Local\FluxSoftware\Flux\flux.exe
C:\Users\Andy\AppData\Roaming\baidu\BaiduYunGuanjia\BaiduYunGuanjia.exe
C:\Program Files\Apoint2K\ApMsgFwd.exe
C:\Program Files\Apoint2K\Apntex.exe
C:\Program Files\TeamViewer\Version8\TeamViewer.exe
C:\Users\Andy\Desktop\HijackThis.exe
 
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Page_URL = http://go.microsoft.com/fwlink/?LinkId=69157
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Default_Search_URL = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKLM\Software\Microsoft\Internet Explorer\Main,Search Page = http://go.microsoft.com/fwlink/?LinkId=54896
R1 - HKCU\Software\Microsoft\Windows\CurrentVersion\Internet Settings,ProxyOverride = *.local
R0 - HKCU\Software\Microsoft\Internet Explorer\Toolbar,LinksFolderName = 
O2 - BHO: Java™ Plug-In SSV Helper - {761497BB-D6F0-462C-B6EB-D4DAF1D92D43} - C:\Program Files\Java\jre7\bin\ssv.dll
O2 - BHO: Java™ Plug-In 2 SSV Helper - {DBC80044-A445-435b-BC74-9C25C1C588A9} - C:\Program Files\Java\jre7\bin\jp2ssv.dll
O3 - Toolbar: Show Xmlbar Toolbar - {6B896ADB-4A82-46e2-858C-13134782CE34} - C:\Program Files\Xmlbar\Youku Downloader\IEBar\xbietb.dll
O4 - HKLM\..\Run: [TVT Scheduler Proxy] C:\Program Files\Common Files\Lenovo\Scheduler\scheduler_proxy.exe
O4 - HKLM\..\Run: [TPWAUDAP] C:\Program Files\Lenovo\HOTKEY\TpWAudAp.exe
O4 - HKLM\..\Run: [TPFNF7] C:\Program Files\Lenovo\NPDIRECT\TPFNF7SP.exe /r
O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
O4 - HKLM\..\Run: [SmartAudio] C:\Program Files\CONEXANT\SMARTAUDIO\SMAUDIO.EXE /c
O4 - HKLM\..\Run: [PMHandler] C:\PROGRA~1\Lenovo\PMDriver\PMHandler.exe
O4 - HKLM\..\Run: [Persistence] C:\Windows\system32\igfxpers.exe
O4 - HKLM\..\Run: [MSC] "c:\Program Files\Microsoft Security Client\msseces.exe" -hide -runkey
O4 - HKLM\..\Run: [LPManager] C:\PROGRA~1\Lenovo\LENOVO~2\LPMGR.exe
O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
O4 - HKLM\..\Run: [HotKeysCmds] C:\Windows\system32\hkcmd.exe
O4 - HKLM\..\Run: [Apoint] C:\Program Files\Apoint2K\Apoint.exe
O4 - HKCU\..\Run: [f.lux] "C:\Users\Andy\AppData\Local\FluxSoftware\Flux\flux.exe" /noshow
O4 - HKCU\..\Run: [BaiduYunGuanjia] "C:\Users\Andy\AppData\Roaming\baidu\BaiduYunGuanjia\BaiduYunGuanjia.exe" AutoRun
O8 - Extra context menu item: &Xmlbar Search - http://www.xmlbar.com/iebar/iemenu.php?lang=English&ver=1.0
O9 - Extra button: Run YoukuDownloader - {612F6E5C-B314-4bab-93D1-D266AAFBE700} - C:\Program Files\Xmlbar\Youku Downloader\YoukuDownloader(xmlbar).exe
O9 - Extra 'Tools' menuitem: Youku Downloader - {612F6E5C-B314-4bab-93D1-D266AAFBE700} - C:\Program Files\Xmlbar\Youku Downloader\YoukuDownloader(xmlbar).exe
O9 - Extra button: Research - {92780B25-18CC-41C8-B9BE-3C9C571A8263} - C:\PROGRA~1\MICROS~2\Office12\REFIEBAR.DLL
O11 - Options group: [ACCELERATED_GRAPHICS] Accelerated graphics
O18 - Protocol: skype4com - {FFC8B962-9B40-4DFF-9458-1830C7DD7F5D} - C:\PROGRA~1\COMMON~1\Skype\SKYPE4~1.DLL
O22 - SharedTaskScheduler: Component Categories cache daemon - {8C7461EF-2B13-11d2-BE35-3078302C2030} - C:\Windows\system32\browseui.dll
O23 - Service: Ac Profile Manager Service (AcPrfMgrSvc) - Lenovo - C:\Program Files\ThinkPad\ConnectUtilities\AcPrfMgrSvc.exe
O23 - Service: Access Connections Main Service (AcSvc) - Lenovo - C:\Program Files\ThinkPad\ConnectUtilities\AcSvc.exe
O23 - Service: Adobe Flash Player Update Service (AdobeFlashPlayerUpdateSvc) - Adobe Systems Incorporated - C:\Windows\system32\Macromed\Flash\FlashPlayerUpdateService.exe
O23 - Service: FLEXnet Licensing Service - Acresso Software Inc. - C:\Program Files\Common Files\Macrovision Shared\FLEXnet Publisher\FNPLicensingService.exe
O23 - Service: Fn+F5 Service (FNF5SVC) - Lenovo. - C:\Program Files\LENOVO\HOTKEY\FNF5SVC.exe
O23 - Service: Google Update Service (gupdate) (gupdate) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: Google Update Service (gupdatem) (gupdatem) - Google Inc. - C:\Program Files\Google\Update\GoogleUpdate.exe
O23 - Service: InstallDriver Table Manager (IDriverT) - Macrovision Corporation - C:\Program Files\Common Files\InstallShield\Driver\1050\Intel 32\IDriverT.exe
O23 - Service: IviRegMgr - InterVideo - C:\Program Files\Common Files\InterVideo\RegMgr\iviRegMgr.exe
O23 - Service: MBAMScheduler - Malwarebytes Corporation - C:\Program Files\Malwarebytes' Anti-Malware\mbamscheduler.exe
O23 - Service: MBAMService - Malwarebytes Corporation - C:\Program Files\Malwarebytes' Anti-Malware\mbamservice.exe
O23 - Service: Mozilla Maintenance Service (MozillaMaintenance) - Mozilla Foundation - C:\Program Files\Mozilla Maintenance Service\maintenanceservice.exe
O23 - Service: PMSveH - Lenovo - C:\Program Files\Lenovo\PMDriver\PMSveH.exe
O23 - Service: LiveShare P2P Server 10 (RoxLiveShare10) - Unknown owner - C:\Program Files\Common Files\Roxio Shared\10.0\SharedCOM\RoxLiveShare10.exe (file missing)
O23 - Service: SessionLauncher - Unknown owner - C:\Users\ADMINI~1\AppData\Local\Temp\DX9\SessionLauncher.exe (file missing)
O23 - Service: System Update (SUService) - Lenovo Group Limited - C:\Program Files\Lenovo\System Update\SUService.exe
O23 - Service: TeamViewer 8 (TeamViewer8) - TeamViewer GmbH - C:\Program Files\TeamViewer\Version8\TeamViewer_Service.exe
O23 - Service: ThinkVantage Registry Monitor Service - Lenovo Group Limited - c:\Program Files\Common Files\Lenovo\tvt_reg_monitor_svc.exe
O23 - Service: On Screen Display (TPHKSVC) - Lenovo Group Limited - C:\Program Files\LENOVO\HOTKEY\TPHKSVC.exe
O23 - Service: TVT Backup Protection Service - Unknown owner - C:\Program Files\Lenovo\Rescue and Recovery\rrpservice.exe
O23 - Service: TVT Backup Service - Lenovo Group Limited - C:\Program Files\Lenovo\Rescue and Recovery\rrservice.exe
O23 - Service: TVT Scheduler - Lenovo Group Limited - c:\Program Files\Common Files\Lenovo\Scheduler\tvtsched.exe
O23 - Service: TVT Windows Update Monitor (TVT_UpdateMonitor) - Lenovo Group Limited - C:\Program Files\Lenovo\Rescue and Recovery\UpdateMonitor.exe
O23 - Service: XAudioService - Conexant Systems, Inc. - C:\Windows\system32\DRIVERS\xaudio.exe
 
--
End of file - 7216 bytes


#12 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:12 AM

Posted 22 February 2014 - 01:01 AM


Greetings

These logs are looking very good, we are almost done!!! Just one more scan to go.

:Remove unneeded start-up entries:

This part of the fix is purely optional
These are programs that start up when you turn on your computer but don't need to be, any of these programs you can click on their icons (or start from the control panel) and start the program when you need it. By stopping these programs you will boot up faster and your computer will work faster.
  • Run HijackThis (rightclick and run as admin)
  • Click on the Scan button
  • Put a check beside all of the items listed below (if present):

    • O4 - HKLM\..\Run: [TPFNF7] C:\Program Files\Lenovo\NPDIRECT\TPFNF7SP.exe /r
      O4 - HKLM\..\Run: [SunJavaUpdateSched] "C:\Program Files\Common Files\Java\Java Update\jusched.exe"
      O4 - HKLM\..\Run: [PMHandler] C:\PROGRA~1\Lenovo\PMDriver\PMHandler.exe
      O4 - HKLM\..\Run: [LPManager] C:\PROGRA~1\Lenovo\LENOVO~2\LPMGR.exe
      O4 - HKLM\..\Run: [iTunesHelper] "C:\Program Files\iTunes\iTunesHelper.exe"
      O4 - HKLM\..\Run: [IgfxTray] C:\Windows\system32\igfxtray.exe
      O4 - HKCU\..\Run: [f.lux] "C:\Users\Andy\AppData\Local\FluxSoftware\Flux\flux.exe" /noshow
      O4 - HKCU\..\Run: [BaiduYunGuanjia] "C:\Users\Andy\AppData\Roaming\baidu\BaiduYunGuanjia\BaiduYunGuanjia.exe" AutoRun


  • Close all open windows and browsers/email, etc...
  • Click on the "Fix Checked" button
  • When completed, close the application.
    • NOTE**You can research each of those lines >here< and see if you want to keep them or not
      just copy the name between the brackets and paste into the search space
      O4 - HKLM\..\Run: [IntelliPoint]


Eset Online Scanner

**Note** You will need to use Internet explorer for this scan - Vista and win 7 right click on IE shortcut and run as admin

Go Eset web page to run an online scanner from ESET.
  • Turn off the real time scanner of any existing antivirus program while performing the online scan
  • click on the Run ESET Online Scanner button
  • Tick the box next to YES, I accept the Terms of Use.
    • Click Start
  • When asked, allow the add/on to be installed
    • Click Start
  • Make sure that the option Remove found threats is unticked
  • Click on Advanced Settings, ensure the options
    • Scan for potentially unwanted applications, Scan for potentially unsafe applications, and Enable Anti-Stealth Technology are ticked.

  • Click Scan
  • wait for the virus definitions to be downloaded
  • Wait for the scan to finish
When the scan is complete
  • If no threats were found
    • put a checkmark in "Uninstall application on close"
    • close program
    • report to me that nothing was found
  • If threats were found
    • click on "list of threats found"
    • click on "export to text file" and save it as ESET SCAN and save to the desktop
    • Click on back
    • put a checkmark in "Uninstall application on close"
    • click on finish
    • close program
    • copy and paste the report here
Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#13 dadscomp

dadscomp
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:01:12 AM

Posted 22 February 2014 - 03:20 AM

Thank you Gringo! 

 

I have removed the start up entries :) Here's the eset scan result:

 

C:\$RECYCLE.BIN\S-1-5-21-2311288496-696126093-1847197915-1003\$RLKQ3CL.exe Win32/Bundled.Toolbar.Google.D potentially unsafe application
C:\AdwCleaner\Quarantine\C\Users\Andy\AppData\Local\Mobogenie\Version\OldVersion\Mobogenie\DaemonProcess.exe.vir a variant of Win32/Mobogenie.A potentially unwanted application
C:\AdwCleaner\Quarantine\C\Users\Andy\AppData\Local\Mobogenie\Version\OldVersion\Mobogenie\Mobogenie.exe.vir a variant of Win32/Mobogenie.A potentially unwanted application
C:\AdwCleaner\Quarantine\C\Users\Andy\AppData\Local\Mobogenie\Version\OldVersion\Mobogenie\New_UpdateMoboGenie.exe.vir a variant of Win32/Mobogenie.A potentially unwanted application
C:\Program Files\GS.Enabler a variant of Win32/SProtector.E potentially unwanted application
C:\Program Files\GSSvc.dll a variant of Win32/SProtector.F potentially unwanted application
C:\Program Files\weeabsavee\VppQEsJ.dll a variant of Win32/AdWare.MultiPlug.N application
C:\Program Files\weeabsavee\VppQEsJ.x64.dll a variant of Win64/Adware.MultiPlug.A application
C:\ProgramData\InstallMate\{BF91E1C2-DC8B-445E-A6B5-94A96472C334}\Custom.dll Win32/InstalleRex.M potentially unwanted application
C:\ProgramData\InstallMate\{CE507859-5ED3-47B3-A558-16F115B35AAF}\Custom.dll Win32/InstalleRex.M potentially unwanted application
C:\ProgramData\InstallMate\{DB7AFCBB-FF66-486E-AA85-B7440099DE4D}\Custom.dll Win32/InstalleRex.M potentially unwanted application
C:\Users\All Users\InstallMate\{BF91E1C2-DC8B-445E-A6B5-94A96472C334}\Custom.dll Win32/InstalleRex.M potentially unwanted application
C:\Users\All Users\InstallMate\{CE507859-5ED3-47B3-A558-16F115B35AAF}\Custom.dll Win32/InstalleRex.M potentially unwanted application
C:\Users\All Users\InstallMate\{DB7AFCBB-FF66-486E-AA85-B7440099DE4D}\Custom.dll Win32/InstalleRex.M potentially unwanted application
C:\Users\Andy\Downloads\FreeAVIMP4WMVMPEGVideoJoiner.exe Win32/OpenCandy potentially unsafe application
D:\computer\index.reg REG/StartPage.NAN trojan


#14 gringo_pr

gringo_pr

    Bleepin Gringo


  • Malware Response Team
  • 136,772 posts
  • OFFLINE
  •  
  • Gender:Male
  • Location:Puerto rico
  • Local time:02:12 AM

Posted 23 February 2014 - 12:57 AM


Hello dadscomp

There are some minor things in your online scan that should be removed.


delete files
  • Copy all text in the code box (below)...to Notepad.
    @echo off
    rd /s /q "C:\AdwCleaner\"
    del /f /s /q "C:\Program Files\GS.Enabler"
    del /f /s /q "C:\Program Files\GSSvc.dll"
    del /f /s /q "C:\Program Files\weeabsavee\VppQEsJ.dll"
    del /f /s /q "C:\Program Files\weeabsavee\VppQEsJ.x64.dll"
    del /f /s /q "C:\ProgramData\InstallMate\{BF91E1C2-DC8B-445E-A6B5-94A96472C334}\Custom.dll"
    del /f /s /q "C:\ProgramData\InstallMate\{CE507859-5ED3-47B3-A558-16F115B35AAF}\Custom.dll"
    del /f /s /q "C:\ProgramData\InstallMate\{DB7AFCBB-FF66-486E-AA85-B7440099DE4D}\Custom.dll"
    del /f /s /q "C:\Users\All Users\InstallMate\{BF91E1C2-DC8B-445E-A6B5-94A96472C334}\Custom.dll"
    del /f /s /q "C:\Users\All Users\InstallMate\{CE507859-5ED3-47B3-A558-16F115B35AAF}\Custom.dll"
    del /f /s /q "C:\Users\All Users\InstallMate\{DB7AFCBB-FF66-486E-AA85-B7440099DE4D}\Custom.dll"
    del /f /s /q "C:\Users\Andy\Downloads\FreeAVIMP4WMVMPEGVideoJoiner.exe"
    del /f /s /q "D:\computer\index.reg"
    del %0
  • Save the Notepad file on your desktop...as delfile.bat... save type as "All Files"
    It should look like this: batfileicon.gif<--XPvista_bat_icon.png<--vista
  • Double click on delfile.bat to execute it.
    A black CMD window will flash, then disappear...this is normal.
  • The files and folders, if found...will have been deleted and the "delfile.bat" file will also be deleted.
The rest of the Online scan is only reporting backups created during the course of this fix C:\Qoobox\Quarantine\, and/or items located in System Restore's cache C:\System Volume Information\, Whatever is in these folders can't harm you unless you choose to perform a manual restore. the following steps will remove these backups.




Very well done!! This is my general post for when your logs show no more signs of malware - Please let me know if you still are having problems with your computer and what these problems are.


:Why we need to remove some of our tools:
  • Some of the tools we have used to clean your computer were made by fellow malware fighters and are very powerful and if used incorrectly or at the wronge time can make the computer an expensive paper weight.
    They are updated all the time and some of them more than once a day so by the time you are ready to use them again they will already be outdated.

    The following procedures will implement some cleanup procedures to remove these tools. It will also reset your System Restore by flushing out previous restore points and create a new restore point. It will also remove all the backups our tools may have made.
:DeFogger:

Note** Defogger only needs to be run if it was run when we first started. If you have not already run it then skip this.
  • To re-enable your Emulation drivers, double click DeFogger to run the tool.
    • The application window will appear
    • Click the Re-enable button to re-enable your CD Emulation drivers
    • Click Yes to continue
    • A 'Finished!' message will appear
    • Click OK
    • DeFogger will now ask to reboot the machine - click OK.
    Your Emulation drivers are now re-enabled.

:Uninstall ComboFix:
  • turn off all active protection software
  • push the "windows key" + "R" (between the "Ctrl" button and "Alt" Button)
  • please copy and past the following into the box ComboFix /Uninstall and click OK.
  • Note the space between the X and the /Uninstall, it needs to be there.
  • CF-Uninstall.png
:Remove the rest of our tools:

Please download DelFix and save it to desktop. This tool will remove all the tools we used to clean your pc.
  • Double-click DelFix.exe.
  • select all options avalible
  • Click the Run button.
  • The tool will delete itself once it finishes, if not delete it by yourself.
  • If asked to restart the computer, please do so
:The programs you can keep:

Some of the programs that we have used would be a good idea to keep and used often in helping to keep the computer clean. I use these programs on my computer.
  • Revo Uninstaller Free - this is the uninstaller that I had you download and works allot better than add/remove in windows and has saved me more than once from corrupted installs and uninstalls

    CCleaner - This is a good program to clean out temp files, I would use this once a week or before any malware scan to remove unwanted temp files - It has a built in registry cleaner but I would leave that alone and not use any registry cleaner

    Malwarebytes' Anti-Malware The Gold standerd today in antimalware scanners

:Security programs:

One of the questions I am asked all the time is "What programs do you use" I have at this time 4 computers in my home and I have this setup on all 4 of them.
  • Microsoft Security Essentials - provides real-time protection for your home PC that guards against viruses, spyware, and other malicious software.
  • WinPatrol As a robust security monitor, WinPatrol will alert you to hijackings, malware attacks and critical changes made to your computer without your permission. WinPatrol takes snapshot of your critical system resources and alerts you to any changes that may occur without your knowledge.
  • Malwarebytes' Anti-Malware Malwarebytes' Anti-Malware is a new and powerful anti-malware tool. It is
    totally free but for real-time protection you will have to pay a small one-time fee. We used this to help clean your computer and recomend keeping it and using often. (I have upgraded to the paid version of MBAM and I am glad I did)


    Note** If you decide to install MSE you will need to uninstall your present Antivirus
:Security awareness:


It is good security practice to change your passwords to all your online accounts on a fairly regular basis, this is especially true after an infection. Refer to this Microsoft article
Strong passwords: How to create and use them Then consider a password keeper, to keep all your passwords safe. KeePass is a small utility that allows you to manage all your passwords.

As Java seems to get exploited on a daily basis I advise to disable java in your web browsers - How to disable java in your web browsers - Disable Java


The other question I am asked all the time is "How can I prevent this from happening again." and the short answer to that is to be aware of what is out there and how to start spotting dangers.

Here are some articles that are must reads and should be read by everybody in your household that uses the internetHere is some more reading for you from some of my collegesquoted from Tech Support Forum

Conclusion

There is no such thing as 'perfect security'. This applies to many things, not just computer systems. Using the above guide you should be able to take all the reasonable steps you can to prevent infection. However, the most important part of all this is you, the user. Surf sensibly and think before you download a file or click on a link. Take a few moments to assess the possible risks and you should be able to enjoy all the internet has to offer.


I'd be grateful if you could reply to this post so that I know you have read it and, if you've no other questions, the thread can then be closed.

I Will Keep This Open For About Three Days, If Anything Comes Up - Just Come Back And Let Me Know, after that time you will have to send me a PM

My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Gringo
I Close My Topics If You Have Not Replied In 5 Days If You Will Be Longer Please Let Me Know

If I Have Not Replied To One Of My Topics In 48 Hrs Please Bump The Topic



My help is free, however, if you wish to make a small donation to show your appreciation or to help me continue the fight against Malware, then click here -->btn_donate_SM.gif<-- Don't worry every little bit helps.

Proud Graduate Of Malware Removal University

#15 dadscomp

dadscomp
  • Topic Starter

  • Members
  • 8 posts
  • OFFLINE
  •  
  • Local time:01:12 AM

Posted 23 February 2014 - 02:00 AM

Thank you so much for all of your help Gringo! You have been amazing throughout and I appreciate all the work you've done for me (and my dad)! You've been a pleasure to work with!!! Please take care :) And feel free to close the thread as I have read your post and had no problems!






0 user(s) are reading this topic

0 members, 0 guests, 0 anonymous users